Usesonekey VirtualPrivateNetwork Trickingpeople fordata  Securesdata byscrambling it  DetectssuspiciousactivityUse atleast 8charactersSecurewebsitetraffic No patchexistsyetNationalInstitute ofStandardsandtechnologyConfidentiality,Integrity,Availability  FindsSecurityflaws Password +SMS code   Hidinginfo infiles ReconnaissanceTrickingusers intosharing info  SocialSecurityNumber Tries allpasswordcombos RansomwareBlocksunauthorizedaccess  VerifiesAuthenticityEquifax(2017)  VerifiesDataIntegrity Networkof infecteddevicesWormsspread ontheir own  Minimalaccessfor tasksUsesonekey VirtualPrivateNetwork Trickingpeople fordata  Securesdata byscrambling it  DetectssuspiciousactivityUse atleast 8charactersSecurewebsitetraffic No patchexistsyetNationalInstitute ofStandardsandtechnologyConfidentiality,Integrity,Availability  FindsSecurityflaws Password +SMS code   Hidinginfo infiles ReconnaissanceTrickingusers intosharing info  SocialSecurityNumber Tries allpasswordcombos RansomwareBlocksunauthorizedaccess  VerifiesAuthenticityEquifax(2017)  VerifiesDataIntegrity Networkof infecteddevicesWormsspread ontheir own  Minimalaccessfor tasks

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
G
3
B
4
O
5
I
6
O
7
G
8
O
9
N
10
B
11
G
12
B
13
I
14
B
15
O
16
O
17
G
18
N
19
G
20
N
21
B
22
N
23
B
24
I
25
I
  1. I-Uses one key
  2. G-Virtual Private Network
  3. B-Tricking people for data
  4. O-Secures data by scrambling it
  5. I-Detects suspicious activity
  6. O-Use at least 8 characters
  7. G-Secure website traffic
  8. O-No patch exists yet
  9. N-National Institute of Standards and technology
  10. B-Confidentiality, Integrity, Availability
  11. G-Finds Security flaws
  12. B-Password + SMS code
  13. I-Hiding info in files
  14. B-Reconnaissance
  15. O-Tricking users into sharing info
  16. O-Social Security Number
  17. G-Tries all password combos
  18. N-Ransomware
  19. G-Blocks unauthorized access
  20. N-Verifies Authenticity
  21. B-Equifax (2017)
  22. N-Verifies Data Integrity
  23. B-Network of infected devices
  24. I-Worms spread on their own
  25. I-Minimal access for tasks