ReconnaissancePassword +SMS code   Minimalaccessfor tasksBlocksunauthorizedaccess  NationalInstitute ofStandardsandtechnologySecurewebsitetraffic FindsSecurityflaws DetectssuspiciousactivityHidinginfo infiles SocialSecurityNumber VerifiesAuthenticityRansomwareSecuresdata byscrambling it  Usesonekey VirtualPrivateNetwork VerifiesDataIntegrity Wormsspread ontheir own  Trickingpeople fordata  Tries allpasswordcombos Networkof infecteddevicesTrickingusers intosharing info  Confidentiality,Integrity,Availability  Equifax(2017)  No patchexistsyetUse atleast 8charactersReconnaissancePassword +SMS code   Minimalaccessfor tasksBlocksunauthorizedaccess  NationalInstitute ofStandardsandtechnologySecurewebsitetraffic FindsSecurityflaws DetectssuspiciousactivityHidinginfo infiles SocialSecurityNumber VerifiesAuthenticityRansomwareSecuresdata byscrambling it  Usesonekey VirtualPrivateNetwork VerifiesDataIntegrity Wormsspread ontheir own  Trickingpeople fordata  Tries allpasswordcombos Networkof infecteddevicesTrickingusers intosharing info  Confidentiality,Integrity,Availability  Equifax(2017)  No patchexistsyetUse atleast 8characters

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
B
3
I
4
G
5
N
6
G
7
G
8
I
9
I
10
O
11
N
12
N
13
O
14
I
15
G
16
N
17
I
18
B
19
G
20
B
21
O
22
B
23
B
24
O
25
O
  1. B-Reconnaissance
  2. B-Password + SMS code
  3. I-Minimal access for tasks
  4. G-Blocks unauthorized access
  5. N-National Institute of Standards and technology
  6. G-Secure website traffic
  7. G-Finds Security flaws
  8. I-Detects suspicious activity
  9. I-Hiding info in files
  10. O-Social Security Number
  11. N-Verifies Authenticity
  12. N-Ransomware
  13. O-Secures data by scrambling it
  14. I-Uses one key
  15. G-Virtual Private Network
  16. N-Verifies Data Integrity
  17. I-Worms spread on their own
  18. B-Tricking people for data
  19. G-Tries all password combos
  20. B-Network of infected devices
  21. O-Tricking users into sharing info
  22. B-Confidentiality, Integrity, Availability
  23. B-Equifax (2017)
  24. O-No patch exists yet
  25. O-Use at least 8 characters