VirtualPrivateNetwork Wormsspread ontheir own  Securewebsitetraffic Use atleast 8charactersFindsSecurityflaws Usesonekey Equifax(2017)  Hidinginfo infiles DetectssuspiciousactivityVerifiesAuthenticityMinimalaccessfor tasksTries allpasswordcombos VerifiesDataIntegrity Trickingpeople fordata  Securesdata byscrambling it  ReconnaissanceBlocksunauthorizedaccess  Trickingusers intosharing info  Password +SMS code   Networkof infecteddevicesNo patchexistsyetConfidentiality,Integrity,Availability  SocialSecurityNumber RansomwareNationalInstitute ofStandardsandtechnologyVirtualPrivateNetwork Wormsspread ontheir own  Securewebsitetraffic Use atleast 8charactersFindsSecurityflaws Usesonekey Equifax(2017)  Hidinginfo infiles DetectssuspiciousactivityVerifiesAuthenticityMinimalaccessfor tasksTries allpasswordcombos VerifiesDataIntegrity Trickingpeople fordata  Securesdata byscrambling it  ReconnaissanceBlocksunauthorizedaccess  Trickingusers intosharing info  Password +SMS code   Networkof infecteddevicesNo patchexistsyetConfidentiality,Integrity,Availability  SocialSecurityNumber RansomwareNationalInstitute ofStandardsandtechnology

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
I
3
G
4
O
5
G
6
I
7
B
8
I
9
I
10
N
11
I
12
G
13
N
14
B
15
O
16
B
17
G
18
O
19
B
20
B
21
O
22
B
23
O
24
N
25
N
  1. G-Virtual Private Network
  2. I-Worms spread on their own
  3. G-Secure website traffic
  4. O-Use at least 8 characters
  5. G-Finds Security flaws
  6. I-Uses one key
  7. B-Equifax (2017)
  8. I-Hiding info in files
  9. I-Detects suspicious activity
  10. N-Verifies Authenticity
  11. I-Minimal access for tasks
  12. G-Tries all password combos
  13. N-Verifies Data Integrity
  14. B-Tricking people for data
  15. O-Secures data by scrambling it
  16. B-Reconnaissance
  17. G-Blocks unauthorized access
  18. O-Tricking users into sharing info
  19. B-Password + SMS code
  20. B-Network of infected devices
  21. O-No patch exists yet
  22. B-Confidentiality, Integrity, Availability
  23. O-Social Security Number
  24. N-Ransomware
  25. N-National Institute of Standards and technology