Exploit Impact Hacktivists Cyber Criminals cyberwarfare Malicious Insider black hat attackers bot ransomware Stuxnet Risk ransomware cybersecurity Risk Assessment Free! internal security threats external security threats confidentiality Integrity Availability Malware phishing Nation- States Threat Attack Code security vulnerability Hackers organized attackers spyware Attack virus Exploit Impact Hacktivists Cyber Criminals cyberwarfare Malicious Insider black hat attackers bot ransomware Stuxnet Risk ransomware cybersecurity Risk Assessment Free! internal security threats external security threats confidentiality Integrity Availability Malware phishing Nation- States Threat Attack Code security vulnerability Hackers organized attackers spyware Attack virus
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Exploit
Impact
Hacktivists
Cyber Criminals
cyberwarfare
Malicious Insider
black hat attackers
bot
ransomware
Stuxnet
Risk
ransomware
cybersecurity
Risk Assessment
Free!
internal security threats
external security threats
confidentiality
Integrity
Availability
Malware
phishing
Nation-States
Threat
Attack Code
security vulnerability
Hackers
organized attackers
spyware
Attack
virus