black hat attackers Malicious Insider Cyber Criminals Stuxnet spyware cybersecurity Hackers Risk Assessment phishing confidentiality cyberwarfare Malware Impact Integrity Hacktivists Nation- States ransomware security vulnerability internal security threats Risk Free! Attack Attack Code virus bot organized attackers Threat external security threats Exploit ransomware Availability black hat attackers Malicious Insider Cyber Criminals Stuxnet spyware cybersecurity Hackers Risk Assessment phishing confidentiality cyberwarfare Malware Impact Integrity Hacktivists Nation- States ransomware security vulnerability internal security threats Risk Free! Attack Attack Code virus bot organized attackers Threat external security threats Exploit ransomware Availability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
black hat attackers
Malicious Insider
Cyber Criminals
Stuxnet
spyware
cybersecurity
Hackers
Risk Assessment
phishing
confidentiality
cyberwarfare
Malware
Impact
Integrity
Hacktivists
Nation-States
ransomware
security vulnerability
internal security threats
Risk
Free!
Attack
Attack Code
virus
bot
organized attackers
Threat
external security threats
Exploit
ransomware
Availability