Securewebsitetraffic Tries allpasswordcombos VerifiesAuthenticitySecuresdata byscrambling it  Usesonekey DetectssuspiciousactivityTrickingusers intosharing info  Equifax(2017)  Password +SMS code   Trickingpeople fordata  SocialSecurityNumber VirtualPrivateNetwork NationalInstitute ofStandardsandtechnologyMinimalaccessfor tasksVerifiesDataIntegrity Confidentiality,Integrity,Availability  No patchexistsyetFindsSecurityflaws Networkof infecteddevicesBlocksunauthorizedaccess  Wormsspread ontheir own  Hidinginfo infiles ReconnaissanceRansomwareUse atleast 8charactersSecurewebsitetraffic Tries allpasswordcombos VerifiesAuthenticitySecuresdata byscrambling it  Usesonekey DetectssuspiciousactivityTrickingusers intosharing info  Equifax(2017)  Password +SMS code   Trickingpeople fordata  SocialSecurityNumber VirtualPrivateNetwork NationalInstitute ofStandardsandtechnologyMinimalaccessfor tasksVerifiesDataIntegrity Confidentiality,Integrity,Availability  No patchexistsyetFindsSecurityflaws Networkof infecteddevicesBlocksunauthorizedaccess  Wormsspread ontheir own  Hidinginfo infiles ReconnaissanceRansomwareUse atleast 8characters

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
G
3
N
4
O
5
I
6
I
7
O
8
B
9
B
10
B
11
O
12
G
13
N
14
I
15
N
16
B
17
O
18
G
19
B
20
G
21
I
22
I
23
B
24
N
25
O
  1. G-Secure website traffic
  2. G-Tries all password combos
  3. N-Verifies Authenticity
  4. O-Secures data by scrambling it
  5. I-Uses one key
  6. I-Detects suspicious activity
  7. O-Tricking users into sharing info
  8. B-Equifax (2017)
  9. B-Password + SMS code
  10. B-Tricking people for data
  11. O-Social Security Number
  12. G-Virtual Private Network
  13. N-National Institute of Standards and technology
  14. I-Minimal access for tasks
  15. N-Verifies Data Integrity
  16. B-Confidentiality, Integrity, Availability
  17. O-No patch exists yet
  18. G-Finds Security flaws
  19. B-Network of infected devices
  20. G-Blocks unauthorized access
  21. I-Worms spread on their own
  22. I-Hiding info in files
  23. B-Reconnaissance
  24. N-Ransomware
  25. O-Use at least 8 characters