SpearPhishingDetectPassPhasePatchManagementIdentifyDataDiscoveryRiskAssessmentAssetManagementAdvancedPersistentThreatSSLDecryptRecoverLeastPrivilegeAntivirusSecureEmailSecurePasswordProtectPhishingFirewallVPNTwo-FactorAuthenticationRespondSecurityAwarenessTrainingTypesofHackersMalwareSpearPhishingDetectPassPhasePatchManagementIdentifyDataDiscoveryRiskAssessmentAssetManagementAdvancedPersistentThreatSSLDecryptRecoverLeastPrivilegeAntivirusSecureEmailSecurePasswordProtectPhishingFirewallVPNTwo-FactorAuthenticationRespondSecurityAwarenessTrainingTypesofHackersMalware

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
O
3
B
4
G
5
G
6
O
7
I
8
N
9
N
10
B
11
O
12
O
13
N
14
N
15
I
16
G
17
I
18
B
19
B
20
O
21
G
22
I
23
B
24
G
  1. I-Spear Phishing
  2. O-Detect
  3. B-PassPhase
  4. G-Patch Management
  5. G-Identify
  6. O-Data Discovery
  7. I-Risk Assessment
  8. N-Asset Management
  9. N-Advanced Persistent Threat
  10. B-SSL Decrypt
  11. O-Recover
  12. O-Least Privilege
  13. N-Antivirus
  14. N-Secure Email
  15. I-Secure Password
  16. G-Protect
  17. I-Phishing
  18. B-Firewall
  19. B-VPN
  20. O-Two-Factor Authentication
  21. G-Respond
  22. I-Security Awareness Training
  23. B-Types of Hackers
  24. G-Malware