MaliciousInsidersAccidentalDatalostAccidentallyDeletionLoss ofDataMaliciousCybercrimeFaultydisksRelianceon theInternetDataControlActs ofterrorismComputervirusesInformationSessionHijackingHarddiskcrashesServiceReliabilityDenialofServicePotentialLoss ofPrivacyHackingDataSystemcrashesDiskdrivesCyberSecurityMaliciousInsidersAccidentalDatalostAccidentallyDeletionLoss ofDataMaliciousCybercrimeFaultydisksRelianceon theInternetDataControlActs ofterrorismComputervirusesInformationSessionHijackingHarddiskcrashesServiceReliabilityDenialofServicePotentialLoss ofPrivacyHackingDataSystemcrashesDiskdrivesCyberSecurity

ICDL: CYBER SECURITY (Maintaining data security) - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
G
3
O
4
B
5
B
6
G
7
O
8
G
9
N
10
G
11
O
12
I
13
I
14
N
15
I
16
B
17
N
18
B
19
I
20
I
21
B
22
O
23
G
24
O
  1. N-Malicious Insiders
  2. G-Accidental
  3. O-Data lost
  4. B-Accidentally
  5. B-Deletion
  6. G-Loss of Data
  7. O-Malicious
  8. G-Cybercrime
  9. N-Faulty disks
  10. G-Reliance on the Internet
  11. O-Data Control
  12. I-Acts of terrorism
  13. I-Computer viruses
  14. N-Information
  15. I-Session Hijacking
  16. B-Hard disk crashes
  17. N-Service Reliability
  18. B-Denial of Service
  19. I-Potential Loss of Privacy
  20. I-Hacking
  21. B-Data
  22. O-System crashes
  23. G-Disk drives
  24. O-Cyber Security