Wormsspread ontheir own  Usesonekey VerifiesDataIntegrity DetectssuspiciousactivityMinimalaccessfor tasksPassword +SMS code   SocialSecurityNumber VerifiesAuthenticityVirtualPrivateNetwork Use atleast 8charactersSecuresdata byscrambling it  FindsSecurityflaws No patchexistsyetTrickingpeople fordata  Confidentiality,Integrity,Availability  Hidinginfo infiles ReconnaissanceNationalInstitute ofStandardsandtechnologyRansomwareTrickingusers intosharing info  Securewebsitetraffic Blocksunauthorizedaccess  Equifax(2017)  Networkof infecteddevicesTries allpasswordcombos Wormsspread ontheir own  Usesonekey VerifiesDataIntegrity DetectssuspiciousactivityMinimalaccessfor tasksPassword +SMS code   SocialSecurityNumber VerifiesAuthenticityVirtualPrivateNetwork Use atleast 8charactersSecuresdata byscrambling it  FindsSecurityflaws No patchexistsyetTrickingpeople fordata  Confidentiality,Integrity,Availability  Hidinginfo infiles ReconnaissanceNationalInstitute ofStandardsandtechnologyRansomwareTrickingusers intosharing info  Securewebsitetraffic Blocksunauthorizedaccess  Equifax(2017)  Networkof infecteddevicesTries allpasswordcombos 

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
I
3
N
4
I
5
I
6
B
7
O
8
N
9
G
10
O
11
O
12
G
13
O
14
B
15
B
16
I
17
B
18
N
19
N
20
O
21
G
22
G
23
B
24
B
25
G
  1. I-Worms spread on their own
  2. I-Uses one key
  3. N-Verifies Data Integrity
  4. I-Detects suspicious activity
  5. I-Minimal access for tasks
  6. B-Password + SMS code
  7. O-Social Security Number
  8. N-Verifies Authenticity
  9. G-Virtual Private Network
  10. O-Use at least 8 characters
  11. O-Secures data by scrambling it
  12. G-Finds Security flaws
  13. O-No patch exists yet
  14. B-Tricking people for data
  15. B-Confidentiality, Integrity, Availability
  16. I-Hiding info in files
  17. B-Reconnaissance
  18. N-National Institute of Standards and technology
  19. N-Ransomware
  20. O-Tricking users into sharing info
  21. G-Secure website traffic
  22. G-Blocks unauthorized access
  23. B-Equifax (2017)
  24. B-Network of infected devices
  25. G-Tries all password combos