Threat Intelligence Feeds 📡 Malware in Email 📧 Intrusion Detection System (IDS) 👀 OSINT Monitoring 🔍 Insider Threat 👥 DDoS Attack 🌊 Advanced Persistent Threat (APT) 🕵️♂️ Incident Response Plan 📜 Input Validation ✅ Dark Web Data Leak 🌑 Botnet Attack 🤖 Phishing Attack 🎣 Network Segmentation 🏢 Credential sniffing 🔑 Password Managers 🔑 Email Authentication ✔ Fake Wi- Fi Attack 📡 Zero-Day Exploit 🚨 Man-in- the- Middle Attack 👀 Ransomware 💰 Brute Force Attack 🔨 Multi-Factor Authentication (MFA) 🔐 IoT Hacking 🤖 SQL Injection 🖥 Threat Intelligence Feeds 📡 Malware in Email 📧 Intrusion Detection System (IDS) 👀 OSINT Monitoring 🔍 Insider Threat 👥 DDoS Attack 🌊 Advanced Persistent Threat (APT) 🕵️♂️ Incident Response Plan 📜 Input Validation ✅ Dark Web Data Leak 🌑 Botnet Attack 🤖 Phishing Attack 🎣 Network Segmentation 🏢 Credential sniffing 🔑 Password Managers 🔑 Email Authentication ✔ Fake Wi- Fi Attack 📡 Zero-Day Exploit 🚨 Man-in- the- Middle Attack 👀 Ransomware 💰 Brute Force Attack 🔨 Multi-Factor Authentication (MFA) 🔐 IoT Hacking 🤖 SQL Injection 🖥
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Threat Intelligence Feeds 📡
B-Malware in Email 📧
N-Intrusion Detection System (IDS) 👀
G-OSINT Monitoring 🔍
O-Insider Threat 👥
B-DDoS Attack 🌊
I-Advanced Persistent Threat (APT) 🕵️♂️
N-Incident Response Plan 📜
G-Input Validation ✅
O-Dark Web Data Leak 🌑
B-Botnet Attack 🤖
I-Phishing Attack 🎣
N-Network Segmentation 🏢
B-Credential sniffing 🔑
G-Password Managers 🔑
G-Email Authentication ✔
O-Fake Wi-Fi Attack 📡
O-Zero-Day Exploit 🚨
I-Man-in-the-Middle Attack 👀
B-Ransomware 💰
O-Brute Force Attack 🔨
N-Multi-Factor Authentication (MFA) 🔐
I-IoT Hacking 🤖
I-SQL Injection 🖥