Law Soft Skills Online Piracy Vulnerability Cyberattack Malware Technical Skills Integrity Threat Cybersecurity Framework Social Engineering Security Breaches Ethics Cybercrime Hacker Confidentiality CIS Critical Security Controls Phising Term of Service Risk Authorization Spoofing Domain Security Cybervandalism Malware Privacy Takedown Notice Availability Session Hijacking Denial of Service Attack (DOS) Authentication Macro Virus Hacking Law Soft Skills Online Piracy Vulnerability Cyberattack Malware Technical Skills Integrity Threat Cybersecurity Framework Social Engineering Security Breaches Ethics Cybercrime Hacker Confidentiality CIS Critical Security Controls Phising Term of Service Risk Authorization Spoofing Domain Security Cybervandalism Malware Privacy Takedown Notice Availability Session Hijacking Denial of Service Attack (DOS) Authentication Macro Virus Hacking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Law
Soft Skills
Online Piracy
Vulnerability
Cyberattack
Malware
Technical
Skills
Integrity
Threat
Cybersecurity
Framework
Social Engineering
Security
Breaches
Ethics
Cybercrime
Hacker
Confidentiality
CIS Critical Security Controls
Phising
Term of
Service
Risk
Authorization
Spoofing
Domain
Security
Cybervandalism
Malware
Privacy
Takedown
Notice
Availability
Session
Hijacking
Denial of Service
Attack (DOS)
Authentication
Macro
Virus
Hacking