Risk Assessment Cyber Criminals ransomware bot phishing virus Threat Risk cyberwarfare Free! ransomware Stuxnet cybersecurity confidentiality Hackers Attack Code Availability Hacktivists Integrity Malware Exploit external security threats Malicious Insider Impact security vulnerability Nation- States spyware Attack organized attackers black hat attackers internal security threats Risk Assessment Cyber Criminals ransomware bot phishing virus Threat Risk cyberwarfare Free! ransomware Stuxnet cybersecurity confidentiality Hackers Attack Code Availability Hacktivists Integrity Malware Exploit external security threats Malicious Insider Impact security vulnerability Nation- States spyware Attack organized attackers black hat attackers internal security threats
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Risk Assessment
Cyber Criminals
ransomware
bot
phishing
virus
Threat
Risk
cyberwarfare
Free!
ransomware
Stuxnet
cybersecurity
confidentiality
Hackers
Attack Code
Availability
Hacktivists
Integrity
Malware
Exploit
external security threats
Malicious Insider
Impact
security vulnerability
Nation-States
spyware
Attack
organized attackers
black hat attackers
internal security threats