RansomwareSecurewebsitetraffic Use atleast 8charactersMinimalaccessfor tasksSecuresdata byscrambling it  Equifax(2017)  SocialSecurityNumber Tries allpasswordcombos Hidinginfo infiles NationalInstitute ofStandardsandtechnologyNo patchexistsyetReconnaissanceUsesonekey Networkof infecteddevicesConfidentiality,Integrity,Availability  Trickingpeople fordata  Blocksunauthorizedaccess  Trickingusers intosharing info  Password +SMS code   DetectssuspiciousactivityVirtualPrivateNetwork VerifiesDataIntegrity Wormsspread ontheir own  FindsSecurityflaws VerifiesAuthenticityRansomwareSecurewebsitetraffic Use atleast 8charactersMinimalaccessfor tasksSecuresdata byscrambling it  Equifax(2017)  SocialSecurityNumber Tries allpasswordcombos Hidinginfo infiles NationalInstitute ofStandardsandtechnologyNo patchexistsyetReconnaissanceUsesonekey Networkof infecteddevicesConfidentiality,Integrity,Availability  Trickingpeople fordata  Blocksunauthorizedaccess  Trickingusers intosharing info  Password +SMS code   DetectssuspiciousactivityVirtualPrivateNetwork VerifiesDataIntegrity Wormsspread ontheir own  FindsSecurityflaws VerifiesAuthenticity

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
G
3
O
4
I
5
O
6
B
7
O
8
G
9
I
10
N
11
O
12
B
13
I
14
B
15
B
16
B
17
G
18
O
19
B
20
I
21
G
22
N
23
I
24
G
25
N
  1. N-Ransomware
  2. G-Secure website traffic
  3. O-Use at least 8 characters
  4. I-Minimal access for tasks
  5. O-Secures data by scrambling it
  6. B-Equifax (2017)
  7. O-Social Security Number
  8. G-Tries all password combos
  9. I-Hiding info in files
  10. N-National Institute of Standards and technology
  11. O-No patch exists yet
  12. B-Reconnaissance
  13. I-Uses one key
  14. B-Network of infected devices
  15. B-Confidentiality, Integrity, Availability
  16. B-Tricking people for data
  17. G-Blocks unauthorized access
  18. O-Tricking users into sharing info
  19. B-Password + SMS code
  20. I-Detects suspicious activity
  21. G-Virtual Private Network
  22. N-Verifies Data Integrity
  23. I-Worms spread on their own
  24. G-Finds Security flaws
  25. N-Verifies Authenticity