Loss ofDataDataSessionHijackingDatalostAccidentalPotentialLoss ofPrivacyInformationHarddiskcrashesActs ofterrorismAccidentallyDenialofServiceDeletionMaliciousFaultydisksDiskdrivesCybercrimeDataControlCyberSecurityHackingSystemcrashesServiceReliabilityComputervirusesMaliciousInsidersRelianceon theInternetLoss ofDataDataSessionHijackingDatalostAccidentalPotentialLoss ofPrivacyInformationHarddiskcrashesActs ofterrorismAccidentallyDenialofServiceDeletionMaliciousFaultydisksDiskdrivesCybercrimeDataControlCyberSecurityHackingSystemcrashesServiceReliabilityComputervirusesMaliciousInsidersRelianceon theInternet

ICDL: CYBER SECURITY (Maintaining data security) - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
B
3
I
4
O
5
G
6
I
7
N
8
B
9
I
10
B
11
B
12
B
13
O
14
N
15
G
16
G
17
O
18
O
19
I
20
O
21
N
22
I
23
N
24
G
  1. G-Loss of Data
  2. B-Data
  3. I-Session Hijacking
  4. O-Data lost
  5. G-Accidental
  6. I-Potential Loss of Privacy
  7. N-Information
  8. B-Hard disk crashes
  9. I-Acts of terrorism
  10. B-Accidentally
  11. B-Denial of Service
  12. B-Deletion
  13. O-Malicious
  14. N-Faulty disks
  15. G-Disk drives
  16. G-Cybercrime
  17. O-Data Control
  18. O-Cyber Security
  19. I-Hacking
  20. O-System crashes
  21. N-Service Reliability
  22. I-Computer viruses
  23. N-Malicious Insiders
  24. G-Reliance on the Internet