DataInformationDiskdrivesDeletionMaliciousAccidentallyServiceReliabilityHarddiskcrashesSystemcrashesDenialofServiceFaultydisksDataControlLoss ofDataAccidentalCyberSecurityRelianceon theInternetSessionHijackingDatalostPotentialLoss ofPrivacyMaliciousInsidersHackingActs ofterrorismComputervirusesCybercrimeDataInformationDiskdrivesDeletionMaliciousAccidentallyServiceReliabilityHarddiskcrashesSystemcrashesDenialofServiceFaultydisksDataControlLoss ofDataAccidentalCyberSecurityRelianceon theInternetSessionHijackingDatalostPotentialLoss ofPrivacyMaliciousInsidersHackingActs ofterrorismComputervirusesCybercrime

ICDL: CYBER SECURITY (Maintaining data security) - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
N
3
G
4
B
5
O
6
B
7
N
8
B
9
O
10
B
11
N
12
O
13
G
14
G
15
O
16
G
17
I
18
O
19
I
20
N
21
I
22
I
23
I
24
G
  1. B-Data
  2. N-Information
  3. G-Disk drives
  4. B-Deletion
  5. O-Malicious
  6. B-Accidentally
  7. N-Service Reliability
  8. B-Hard disk crashes
  9. O-System crashes
  10. B-Denial of Service
  11. N-Faulty disks
  12. O-Data Control
  13. G-Loss of Data
  14. G-Accidental
  15. O-Cyber Security
  16. G-Reliance on the Internet
  17. I-Session Hijacking
  18. O-Data lost
  19. I-Potential Loss of Privacy
  20. N-Malicious Insiders
  21. I-Hacking
  22. I-Acts of terrorism
  23. I-Computer viruses
  24. G-Cybercrime