DetectssuspiciousactivityReconnaissanceNo patchexistsyetSocialSecurityNumber Securewebsitetraffic Wormsspread ontheir own  Use atleast 8charactersMinimalaccessfor tasksPassword +SMS code   Usesonekey Confidentiality,Integrity,Availability  VerifiesDataIntegrity NationalInstitute ofStandardsandtechnologyHidinginfo infiles Tries allpasswordcombos Networkof infecteddevicesVerifiesAuthenticityFindsSecurityflaws Securesdata byscrambling it  Blocksunauthorizedaccess  Equifax(2017)  RansomwareTrickingusers intosharing info  VirtualPrivateNetwork Trickingpeople fordata  DetectssuspiciousactivityReconnaissanceNo patchexistsyetSocialSecurityNumber Securewebsitetraffic Wormsspread ontheir own  Use atleast 8charactersMinimalaccessfor tasksPassword +SMS code   Usesonekey Confidentiality,Integrity,Availability  VerifiesDataIntegrity NationalInstitute ofStandardsandtechnologyHidinginfo infiles Tries allpasswordcombos Networkof infecteddevicesVerifiesAuthenticityFindsSecurityflaws Securesdata byscrambling it  Blocksunauthorizedaccess  Equifax(2017)  RansomwareTrickingusers intosharing info  VirtualPrivateNetwork Trickingpeople fordata  

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
B
3
O
4
O
5
G
6
I
7
O
8
I
9
B
10
I
11
B
12
N
13
N
14
I
15
G
16
B
17
N
18
G
19
O
20
G
21
B
22
N
23
O
24
G
25
B
  1. I-Detects suspicious activity
  2. B-Reconnaissance
  3. O-No patch exists yet
  4. O-Social Security Number
  5. G-Secure website traffic
  6. I-Worms spread on their own
  7. O-Use at least 8 characters
  8. I-Minimal access for tasks
  9. B-Password + SMS code
  10. I-Uses one key
  11. B-Confidentiality, Integrity, Availability
  12. N-Verifies Data Integrity
  13. N-National Institute of Standards and technology
  14. I-Hiding info in files
  15. G-Tries all password combos
  16. B-Network of infected devices
  17. N-Verifies Authenticity
  18. G-Finds Security flaws
  19. O-Secures data by scrambling it
  20. G-Blocks unauthorized access
  21. B-Equifax (2017)
  22. N-Ransomware
  23. O-Tricking users into sharing info
  24. G-Virtual Private Network
  25. B-Tricking people for data