HackingSystemcrashesDataControlSessionHijackingDiskdrivesRelianceon theInternetInformationMaliciousAccidentalDenialofServiceActs ofterrorismComputervirusesDeletionPotentialLoss ofPrivacyDatalostCyberSecurityHarddiskcrashesCybercrimeDataLoss ofDataAccidentallyMaliciousInsidersServiceReliabilityFaultydisksHackingSystemcrashesDataControlSessionHijackingDiskdrivesRelianceon theInternetInformationMaliciousAccidentalDenialofServiceActs ofterrorismComputervirusesDeletionPotentialLoss ofPrivacyDatalostCyberSecurityHarddiskcrashesCybercrimeDataLoss ofDataAccidentallyMaliciousInsidersServiceReliabilityFaultydisks

ICDL: CYBER SECURITY (Maintaining data security) - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
O
3
O
4
I
5
G
6
G
7
N
8
O
9
G
10
B
11
I
12
I
13
B
14
I
15
O
16
O
17
B
18
G
19
B
20
G
21
B
22
N
23
N
24
N
  1. I-Hacking
  2. O-System crashes
  3. O-Data Control
  4. I-Session Hijacking
  5. G-Disk drives
  6. G-Reliance on the Internet
  7. N-Information
  8. O-Malicious
  9. G-Accidental
  10. B-Denial of Service
  11. I-Acts of terrorism
  12. I-Computer viruses
  13. B-Deletion
  14. I-Potential Loss of Privacy
  15. O-Data lost
  16. O-Cyber Security
  17. B-Hard disk crashes
  18. G-Cybercrime
  19. B-Data
  20. G-Loss of Data
  21. B-Accidentally
  22. N-Malicious Insiders
  23. N-Service Reliability
  24. N-Faulty disks