Securewebsitetraffic Equifax(2017)  Tries allpasswordcombos VirtualPrivateNetwork RansomwareReconnaissanceNo patchexistsyetMinimalaccessfor tasksPassword +SMS code   NationalInstitute ofStandardsandtechnologyVerifiesDataIntegrity Usesonekey VerifiesAuthenticityTrickingpeople fordata  Hidinginfo infiles DetectssuspiciousactivityNetworkof infecteddevicesConfidentiality,Integrity,Availability  Blocksunauthorizedaccess  Trickingusers intosharing info  Securesdata byscrambling it  Use atleast 8charactersSocialSecurityNumber FindsSecurityflaws Wormsspread ontheir own  Securewebsitetraffic Equifax(2017)  Tries allpasswordcombos VirtualPrivateNetwork RansomwareReconnaissanceNo patchexistsyetMinimalaccessfor tasksPassword +SMS code   NationalInstitute ofStandardsandtechnologyVerifiesDataIntegrity Usesonekey VerifiesAuthenticityTrickingpeople fordata  Hidinginfo infiles DetectssuspiciousactivityNetworkof infecteddevicesConfidentiality,Integrity,Availability  Blocksunauthorizedaccess  Trickingusers intosharing info  Securesdata byscrambling it  Use atleast 8charactersSocialSecurityNumber FindsSecurityflaws Wormsspread ontheir own  

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
B
3
G
4
G
5
N
6
B
7
O
8
I
9
B
10
N
11
N
12
I
13
N
14
B
15
I
16
I
17
B
18
B
19
G
20
O
21
O
22
O
23
O
24
G
25
I
  1. G-Secure website traffic
  2. B-Equifax (2017)
  3. G-Tries all password combos
  4. G-Virtual Private Network
  5. N-Ransomware
  6. B-Reconnaissance
  7. O-No patch exists yet
  8. I-Minimal access for tasks
  9. B-Password + SMS code
  10. N-National Institute of Standards and technology
  11. N-Verifies Data Integrity
  12. I-Uses one key
  13. N-Verifies Authenticity
  14. B-Tricking people for data
  15. I-Hiding info in files
  16. I-Detects suspicious activity
  17. B-Network of infected devices
  18. B-Confidentiality, Integrity, Availability
  19. G-Blocks unauthorized access
  20. O-Tricking users into sharing info
  21. O-Secures data by scrambling it
  22. O-Use at least 8 characters
  23. O-Social Security Number
  24. G-Finds Security flaws
  25. I-Worms spread on their own