PotentialLoss ofPrivacyDataControlAccidentalRelianceon theInternetFaultydisksDataCyberSecurityComputervirusesCybercrimeMaliciousDeletionServiceReliabilityDenialofServiceLoss ofDataDatalostMaliciousInsidersSystemcrashesSessionHijackingAccidentallyActs ofterrorismHarddiskcrashesHackingInformationDiskdrivesPotentialLoss ofPrivacyDataControlAccidentalRelianceon theInternetFaultydisksDataCyberSecurityComputervirusesCybercrimeMaliciousDeletionServiceReliabilityDenialofServiceLoss ofDataDatalostMaliciousInsidersSystemcrashesSessionHijackingAccidentallyActs ofterrorismHarddiskcrashesHackingInformationDiskdrives

ICDL: CYBER SECURITY (Maintaining data security) - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
O
3
G
4
G
5
N
6
B
7
O
8
I
9
G
10
O
11
B
12
N
13
B
14
G
15
O
16
N
17
O
18
I
19
B
20
I
21
B
22
I
23
N
24
G
  1. I-Potential Loss of Privacy
  2. O-Data Control
  3. G-Accidental
  4. G-Reliance on the Internet
  5. N-Faulty disks
  6. B-Data
  7. O-Cyber Security
  8. I-Computer viruses
  9. G-Cybercrime
  10. O-Malicious
  11. B-Deletion
  12. N-Service Reliability
  13. B-Denial of Service
  14. G-Loss of Data
  15. O-Data lost
  16. N-Malicious Insiders
  17. O-System crashes
  18. I-Session Hijacking
  19. B-Accidentally
  20. I-Acts of terrorism
  21. B-Hard disk crashes
  22. I-Hacking
  23. N-Information
  24. G-Disk drives