external security threats Impact Cyber Criminals Risk Malware Risk Assessment ransomware Attack Attack Code cybersecurity organized attackers Hackers black hat attackers spyware Stuxnet security vulnerability Availability confidentiality Hacktivists phishing Threat internal security threats bot cyberwarfare Exploit ransomware Nation- States Malicious Insider virus Integrity Free! external security threats Impact Cyber Criminals Risk Malware Risk Assessment ransomware Attack Attack Code cybersecurity organized attackers Hackers black hat attackers spyware Stuxnet security vulnerability Availability confidentiality Hacktivists phishing Threat internal security threats bot cyberwarfare Exploit ransomware Nation- States Malicious Insider virus Integrity Free!
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
external security threats
Impact
Cyber Criminals
Risk
Malware
Risk Assessment
ransomware
Attack
Attack Code
cybersecurity
organized attackers
Hackers
black hat attackers
spyware
Stuxnet
security vulnerability
Availability
confidentiality
Hacktivists
phishing
Threat
internal security threats
bot
cyberwarfare
Exploit
ransomware
Nation-States
Malicious Insider
virus
Integrity
Free!