confidentiality spyware external security threats Nation- States Cyber Criminals phishing organized attackers security vulnerability Risk Assessment Hacktivists Exploit internal security threats bot black hat attackers Free! Impact Hackers cyberwarfare Stuxnet cybersecurity Risk Threat ransomware Availability ransomware Attack virus Malware Attack Code Integrity Malicious Insider confidentiality spyware external security threats Nation- States Cyber Criminals phishing organized attackers security vulnerability Risk Assessment Hacktivists Exploit internal security threats bot black hat attackers Free! Impact Hackers cyberwarfare Stuxnet cybersecurity Risk Threat ransomware Availability ransomware Attack virus Malware Attack Code Integrity Malicious Insider
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
confidentiality
spyware
external security threats
Nation-States
Cyber Criminals
phishing
organized attackers
security vulnerability
Risk Assessment
Hacktivists
Exploit
internal security threats
bot
black hat attackers
Free!
Impact
Hackers
cyberwarfare
Stuxnet
cybersecurity
Risk
Threat
ransomware
Availability
ransomware
Attack
virus
Malware
Attack Code
Integrity
Malicious Insider