ServiceReliabilityLoss ofDataDiskdrivesActs ofterrorismDataFaultydisksCybercrimeInformationDatalostSystemcrashesHackingDataControlMaliciousPotentialLoss ofPrivacyMaliciousInsidersDenialofServiceAccidentalCyberSecurityHarddiskcrashesRelianceon theInternetDeletionSessionHijackingAccidentallyComputervirusesServiceReliabilityLoss ofDataDiskdrivesActs ofterrorismDataFaultydisksCybercrimeInformationDatalostSystemcrashesHackingDataControlMaliciousPotentialLoss ofPrivacyMaliciousInsidersDenialofServiceAccidentalCyberSecurityHarddiskcrashesRelianceon theInternetDeletionSessionHijackingAccidentallyComputerviruses

ICDL: CYBER SECURITY (Maintaining data security) - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
G
3
G
4
I
5
B
6
N
7
G
8
N
9
O
10
O
11
I
12
O
13
O
14
I
15
N
16
B
17
G
18
O
19
B
20
G
21
B
22
I
23
B
24
I
  1. N-Service Reliability
  2. G-Loss of Data
  3. G-Disk drives
  4. I-Acts of terrorism
  5. B-Data
  6. N-Faulty disks
  7. G-Cybercrime
  8. N-Information
  9. O-Data lost
  10. O-System crashes
  11. I-Hacking
  12. O-Data Control
  13. O-Malicious
  14. I-Potential Loss of Privacy
  15. N-Malicious Insiders
  16. B-Denial of Service
  17. G-Accidental
  18. O-Cyber Security
  19. B-Hard disk crashes
  20. G-Reliance on the Internet
  21. B-Deletion
  22. I-Session Hijacking
  23. B-Accidentally
  24. I-Computer viruses