Malicious Insiders Accidental Data lost Accidentally Deletion Loss of Data Malicious Cybercrime Faulty disks Reliance on the Internet Data Control Acts of terrorism Computer viruses Information Session Hijacking Hard disk crashes Service Reliability Denial of Service Potential Loss of Privacy Hacking Data System crashes Disk drives Cyber Security Malicious Insiders Accidental Data lost Accidentally Deletion Loss of Data Malicious Cybercrime Faulty disks Reliance on the Internet Data Control Acts of terrorism Computer viruses Information Session Hijacking Hard disk crashes Service Reliability Denial of Service Potential Loss of Privacy Hacking Data System crashes Disk drives Cyber Security
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
N-Malicious Insiders
G-Accidental
O-Data lost
B-Accidentally
B-Deletion
G-Loss of Data
O-Malicious
G-Cybercrime
N-Faulty disks
G-Reliance on the Internet
O-Data Control
I-Acts of terrorism
I-Computer viruses
N-Information
I-Session Hijacking
B-Hard disk crashes
N-Service Reliability
B-Denial of Service
I-Potential Loss of Privacy
I-Hacking
B-Data
O-System crashes
G-Disk drives
O-Cyber
Security