DeletionInformationRelianceon theInternetDiskdrivesPotentialLoss ofPrivacyCyberSecurityMaliciousInsidersFaultydisksLoss ofDataSessionHijackingSystemcrashesDataDatalostAccidentallyMaliciousHarddiskcrashesActs ofterrorismAccidentalDenialofServiceComputervirusesServiceReliabilityHackingDataControlCybercrimeDeletionInformationRelianceon theInternetDiskdrivesPotentialLoss ofPrivacyCyberSecurityMaliciousInsidersFaultydisksLoss ofDataSessionHijackingSystemcrashesDataDatalostAccidentallyMaliciousHarddiskcrashesActs ofterrorismAccidentalDenialofServiceComputervirusesServiceReliabilityHackingDataControlCybercrime

ICDL: CYBER SECURITY (Maintaining data security) - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
N
3
G
4
G
5
I
6
O
7
N
8
N
9
G
10
I
11
O
12
B
13
O
14
B
15
O
16
B
17
I
18
G
19
B
20
I
21
N
22
I
23
O
24
G
  1. B-Deletion
  2. N-Information
  3. G-Reliance on the Internet
  4. G-Disk drives
  5. I-Potential Loss of Privacy
  6. O-Cyber Security
  7. N-Malicious Insiders
  8. N-Faulty disks
  9. G-Loss of Data
  10. I-Session Hijacking
  11. O-System crashes
  12. B-Data
  13. O-Data lost
  14. B-Accidentally
  15. O-Malicious
  16. B-Hard disk crashes
  17. I-Acts of terrorism
  18. G-Accidental
  19. B-Denial of Service
  20. I-Computer viruses
  21. N-Service Reliability
  22. I-Hacking
  23. O-Data Control
  24. G-Cybercrime