ServiceReliabilityDataAccidentallyHackingActs ofterrorismHarddiskcrashesMaliciousInsidersAccidentalCybercrimeDataControlPotentialLoss ofPrivacyDatalostRelianceon theInternetDeletionFaultydisksInformationDenialofServiceComputervirusesSystemcrashesMaliciousCyberSecurityLoss ofDataDiskdrivesSessionHijackingServiceReliabilityDataAccidentallyHackingActs ofterrorismHarddiskcrashesMaliciousInsidersAccidentalCybercrimeDataControlPotentialLoss ofPrivacyDatalostRelianceon theInternetDeletionFaultydisksInformationDenialofServiceComputervirusesSystemcrashesMaliciousCyberSecurityLoss ofDataDiskdrivesSessionHijacking

ICDL: CYBER SECURITY (Maintaining data security) - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
B
3
B
4
I
5
I
6
B
7
N
8
G
9
G
10
O
11
I
12
O
13
G
14
B
15
N
16
N
17
B
18
I
19
O
20
O
21
O
22
G
23
G
24
I
  1. N-Service Reliability
  2. B-Data
  3. B-Accidentally
  4. I-Hacking
  5. I-Acts of terrorism
  6. B-Hard disk crashes
  7. N-Malicious Insiders
  8. G-Accidental
  9. G-Cybercrime
  10. O-Data Control
  11. I-Potential Loss of Privacy
  12. O-Data lost
  13. G-Reliance on the Internet
  14. B-Deletion
  15. N-Faulty disks
  16. N-Information
  17. B-Denial of Service
  18. I-Computer viruses
  19. O-System crashes
  20. O-Malicious
  21. O-Cyber Security
  22. G-Loss of Data
  23. G-Disk drives
  24. I-Session Hijacking