Hidinginfo infiles FindsSecurityflaws Equifax(2017)  Blocksunauthorizedaccess  Trickingpeople fordata  Usesonekey Networkof infecteddevicesUse atleast 8charactersReconnaissancePassword +SMS code   NationalInstitute ofStandardsandtechnologyNo patchexistsyetVirtualPrivateNetwork DetectssuspiciousactivityWormsspread ontheir own  RansomwareSecurewebsitetraffic VerifiesAuthenticityTrickingusers intosharing info  VerifiesDataIntegrity Securesdata byscrambling it  Tries allpasswordcombos SocialSecurityNumber Minimalaccessfor tasksConfidentiality,Integrity,Availability  Hidinginfo infiles FindsSecurityflaws Equifax(2017)  Blocksunauthorizedaccess  Trickingpeople fordata  Usesonekey Networkof infecteddevicesUse atleast 8charactersReconnaissancePassword +SMS code   NationalInstitute ofStandardsandtechnologyNo patchexistsyetVirtualPrivateNetwork DetectssuspiciousactivityWormsspread ontheir own  RansomwareSecurewebsitetraffic VerifiesAuthenticityTrickingusers intosharing info  VerifiesDataIntegrity Securesdata byscrambling it  Tries allpasswordcombos SocialSecurityNumber Minimalaccessfor tasksConfidentiality,Integrity,Availability  

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
G
3
B
4
G
5
B
6
I
7
B
8
O
9
B
10
B
11
N
12
O
13
G
14
I
15
I
16
N
17
G
18
N
19
O
20
N
21
O
22
G
23
O
24
I
25
B
  1. I-Hiding info in files
  2. G-Finds Security flaws
  3. B-Equifax (2017)
  4. G-Blocks unauthorized access
  5. B-Tricking people for data
  6. I-Uses one key
  7. B-Network of infected devices
  8. O-Use at least 8 characters
  9. B-Reconnaissance
  10. B-Password + SMS code
  11. N-National Institute of Standards and technology
  12. O-No patch exists yet
  13. G-Virtual Private Network
  14. I-Detects suspicious activity
  15. I-Worms spread on their own
  16. N-Ransomware
  17. G-Secure website traffic
  18. N-Verifies Authenticity
  19. O-Tricking users into sharing info
  20. N-Verifies Data Integrity
  21. O-Secures data by scrambling it
  22. G-Tries all password combos
  23. O-Social Security Number
  24. I-Minimal access for tasks
  25. B-Confidentiality, Integrity, Availability