No patchexistsyetVirtualPrivateNetwork Confidentiality,Integrity,Availability  Trickingusers intosharing info  SocialSecurityNumber VerifiesDataIntegrity Hidinginfo infiles FindsSecurityflaws Blocksunauthorizedaccess  Equifax(2017)  Usesonekey Securewebsitetraffic NationalInstitute ofStandardsandtechnologyTries allpasswordcombos Networkof infecteddevicesReconnaissanceMinimalaccessfor tasksVerifiesAuthenticityTrickingpeople fordata  DetectssuspiciousactivityPassword +SMS code   Securesdata byscrambling it  Wormsspread ontheir own  RansomwareUse atleast 8charactersNo patchexistsyetVirtualPrivateNetwork Confidentiality,Integrity,Availability  Trickingusers intosharing info  SocialSecurityNumber VerifiesDataIntegrity Hidinginfo infiles FindsSecurityflaws Blocksunauthorizedaccess  Equifax(2017)  Usesonekey Securewebsitetraffic NationalInstitute ofStandardsandtechnologyTries allpasswordcombos Networkof infecteddevicesReconnaissanceMinimalaccessfor tasksVerifiesAuthenticityTrickingpeople fordata  DetectssuspiciousactivityPassword +SMS code   Securesdata byscrambling it  Wormsspread ontheir own  RansomwareUse atleast 8characters

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
O
2
G
3
B
4
O
5
O
6
N
7
I
8
G
9
G
10
B
11
I
12
G
13
N
14
G
15
B
16
B
17
I
18
N
19
B
20
I
21
B
22
O
23
I
24
N
25
O
  1. O-No patch exists yet
  2. G-Virtual Private Network
  3. B-Confidentiality, Integrity, Availability
  4. O-Tricking users into sharing info
  5. O-Social Security Number
  6. N-Verifies Data Integrity
  7. I-Hiding info in files
  8. G-Finds Security flaws
  9. G-Blocks unauthorized access
  10. B-Equifax (2017)
  11. I-Uses one key
  12. G-Secure website traffic
  13. N-National Institute of Standards and technology
  14. G-Tries all password combos
  15. B-Network of infected devices
  16. B-Reconnaissance
  17. I-Minimal access for tasks
  18. N-Verifies Authenticity
  19. B-Tricking people for data
  20. I-Detects suspicious activity
  21. B-Password + SMS code
  22. O-Secures data by scrambling it
  23. I-Worms spread on their own
  24. N-Ransomware
  25. O-Use at least 8 characters