black hat attackers virus Stuxnet bot Cyber Criminals Malicious Insider phishing Risk Assessment ransomware cyberwarfare spyware Threat Free! cybersecurity Attack external security threats Integrity Exploit Malware organized attackers Risk Hacktivists Hackers Availability Impact security vulnerability confidentiality internal security threats ransomware Nation- States Attack Code black hat attackers virus Stuxnet bot Cyber Criminals Malicious Insider phishing Risk Assessment ransomware cyberwarfare spyware Threat Free! cybersecurity Attack external security threats Integrity Exploit Malware organized attackers Risk Hacktivists Hackers Availability Impact security vulnerability confidentiality internal security threats ransomware Nation- States Attack Code
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
black hat attackers
virus
Stuxnet
bot
Cyber Criminals
Malicious Insider
phishing
Risk Assessment
ransomware
cyberwarfare
spyware
Threat
Free!
cybersecurity
Attack
external security threats
Integrity
Exploit
Malware
organized attackers
Risk
Hacktivists
Hackers
Availability
Impact
security vulnerability
confidentiality
internal security threats
ransomware
Nation-States
Attack Code