FindsSecurityflaws Securesdata byscrambling it  Hidinginfo infiles Equifax(2017)  VirtualPrivateNetwork Password +SMS code   Blocksunauthorizedaccess  ReconnaissanceUse atleast 8charactersNetworkof infecteddevicesMinimalaccessfor tasksSecurewebsitetraffic Wormsspread ontheir own  NationalInstitute ofStandardsandtechnologyDetectssuspiciousactivityTrickingusers intosharing info  VerifiesAuthenticityTrickingpeople fordata  No patchexistsyetVerifiesDataIntegrity RansomwareTries allpasswordcombos SocialSecurityNumber Usesonekey Confidentiality,Integrity,Availability  FindsSecurityflaws Securesdata byscrambling it  Hidinginfo infiles Equifax(2017)  VirtualPrivateNetwork Password +SMS code   Blocksunauthorizedaccess  ReconnaissanceUse atleast 8charactersNetworkof infecteddevicesMinimalaccessfor tasksSecurewebsitetraffic Wormsspread ontheir own  NationalInstitute ofStandardsandtechnologyDetectssuspiciousactivityTrickingusers intosharing info  VerifiesAuthenticityTrickingpeople fordata  No patchexistsyetVerifiesDataIntegrity RansomwareTries allpasswordcombos SocialSecurityNumber Usesonekey Confidentiality,Integrity,Availability  

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
O
3
I
4
B
5
G
6
B
7
G
8
B
9
O
10
B
11
I
12
G
13
I
14
N
15
I
16
O
17
N
18
B
19
O
20
N
21
N
22
G
23
O
24
I
25
B
  1. G-Finds Security flaws
  2. O-Secures data by scrambling it
  3. I-Hiding info in files
  4. B-Equifax (2017)
  5. G-Virtual Private Network
  6. B-Password + SMS code
  7. G-Blocks unauthorized access
  8. B-Reconnaissance
  9. O-Use at least 8 characters
  10. B-Network of infected devices
  11. I-Minimal access for tasks
  12. G-Secure website traffic
  13. I-Worms spread on their own
  14. N-National Institute of Standards and technology
  15. I-Detects suspicious activity
  16. O-Tricking users into sharing info
  17. N-Verifies Authenticity
  18. B-Tricking people for data
  19. O-No patch exists yet
  20. N-Verifies Data Integrity
  21. N-Ransomware
  22. G-Tries all password combos
  23. O-Social Security Number
  24. I-Uses one key
  25. B-Confidentiality, Integrity, Availability