cybersecurity Risk Assessment Integrity Threat Impact ransomware Attack Code Risk ransomware phishing Cyber Criminals internal security threats bot Malicious Insider cyberwarfare Hackers security vulnerability external security threats Hacktivists virus Exploit Stuxnet Nation- States black hat attackers organized attackers Free! spyware Malware Attack confidentiality Availability cybersecurity Risk Assessment Integrity Threat Impact ransomware Attack Code Risk ransomware phishing Cyber Criminals internal security threats bot Malicious Insider cyberwarfare Hackers security vulnerability external security threats Hacktivists virus Exploit Stuxnet Nation- States black hat attackers organized attackers Free! spyware Malware Attack confidentiality Availability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
cybersecurity
Risk Assessment
Integrity
Threat
Impact
ransomware
Attack Code
Risk
ransomware
phishing
Cyber Criminals
internal security threats
bot
Malicious Insider
cyberwarfare
Hackers
security vulnerability
external security threats
Hacktivists
virus
Exploit
Stuxnet
Nation-States
black hat attackers
organized attackers
Free!
spyware
Malware
Attack
confidentiality
Availability