Use atleast 8charactersUsesonekey No patchexistsyetConfidentiality,Integrity,Availability  Securewebsitetraffic VirtualPrivateNetwork Networkof infecteddevicesDetectssuspiciousactivityTries allpasswordcombos Blocksunauthorizedaccess  FindsSecurityflaws Wormsspread ontheir own  Trickingpeople fordata  Hidinginfo infiles Password +SMS code   SocialSecurityNumber Equifax(2017)  VerifiesDataIntegrity Securesdata byscrambling it  NationalInstitute ofStandardsandtechnologyTrickingusers intosharing info  VerifiesAuthenticityRansomwareMinimalaccessfor tasksReconnaissanceUse atleast 8charactersUsesonekey No patchexistsyetConfidentiality,Integrity,Availability  Securewebsitetraffic VirtualPrivateNetwork Networkof infecteddevicesDetectssuspiciousactivityTries allpasswordcombos Blocksunauthorizedaccess  FindsSecurityflaws Wormsspread ontheir own  Trickingpeople fordata  Hidinginfo infiles Password +SMS code   SocialSecurityNumber Equifax(2017)  VerifiesDataIntegrity Securesdata byscrambling it  NationalInstitute ofStandardsandtechnologyTrickingusers intosharing info  VerifiesAuthenticityRansomwareMinimalaccessfor tasksReconnaissance

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
O
2
I
3
O
4
B
5
G
6
G
7
B
8
I
9
G
10
G
11
G
12
I
13
B
14
I
15
B
16
O
17
B
18
N
19
O
20
N
21
O
22
N
23
N
24
I
25
B
  1. O-Use at least 8 characters
  2. I-Uses one key
  3. O-No patch exists yet
  4. B-Confidentiality, Integrity, Availability
  5. G-Secure website traffic
  6. G-Virtual Private Network
  7. B-Network of infected devices
  8. I-Detects suspicious activity
  9. G-Tries all password combos
  10. G-Blocks unauthorized access
  11. G-Finds Security flaws
  12. I-Worms spread on their own
  13. B-Tricking people for data
  14. I-Hiding info in files
  15. B-Password + SMS code
  16. O-Social Security Number
  17. B-Equifax (2017)
  18. N-Verifies Data Integrity
  19. O-Secures data by scrambling it
  20. N-National Institute of Standards and technology
  21. O-Tricking users into sharing info
  22. N-Verifies Authenticity
  23. N-Ransomware
  24. I-Minimal access for tasks
  25. B-Reconnaissance