DenialofServiceAccidentallyDatalostComputervirusesDeletionDiskdrivesSessionHijackingDataAccidentalRelianceon theInternetMaliciousHarddiskcrashesCybercrimeServiceReliabilitySystemcrashesInformationActs ofterrorismMaliciousInsidersPotentialLoss ofPrivacyDataControlFaultydisksHackingCyberSecurityLoss ofDataDenialofServiceAccidentallyDatalostComputervirusesDeletionDiskdrivesSessionHijackingDataAccidentalRelianceon theInternetMaliciousHarddiskcrashesCybercrimeServiceReliabilitySystemcrashesInformationActs ofterrorismMaliciousInsidersPotentialLoss ofPrivacyDataControlFaultydisksHackingCyberSecurityLoss ofData

ICDL: CYBER SECURITY (Maintaining data security) - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
B
3
O
4
I
5
B
6
G
7
I
8
B
9
G
10
G
11
O
12
B
13
G
14
N
15
O
16
N
17
I
18
N
19
I
20
O
21
N
22
I
23
O
24
G
  1. B-Denial of Service
  2. B-Accidentally
  3. O-Data lost
  4. I-Computer viruses
  5. B-Deletion
  6. G-Disk drives
  7. I-Session Hijacking
  8. B-Data
  9. G-Accidental
  10. G-Reliance on the Internet
  11. O-Malicious
  12. B-Hard disk crashes
  13. G-Cybercrime
  14. N-Service Reliability
  15. O-System crashes
  16. N-Information
  17. I-Acts of terrorism
  18. N-Malicious Insiders
  19. I-Potential Loss of Privacy
  20. O-Data Control
  21. N-Faulty disks
  22. I-Hacking
  23. O-Cyber Security
  24. G-Loss of Data