Cybercrime CIS Critical Security Controls Cybervandalism Technical Skills Law Takedown Notice Session Hijacking Cybersecurity Framework Vulnerability Social Engineering Malware Security Breaches Availability Authorization Privacy Risk Authentication Confidentiality Hacker Term of Service Ethics Phising Threat Spoofing Integrity Malware Hacking Soft Skills Online Piracy Domain Denial of Service Attack (DOS) Cyberattack Security Macro Virus Cybercrime CIS Critical Security Controls Cybervandalism Technical Skills Law Takedown Notice Session Hijacking Cybersecurity Framework Vulnerability Social Engineering Malware Security Breaches Availability Authorization Privacy Risk Authentication Confidentiality Hacker Term of Service Ethics Phising Threat Spoofing Integrity Malware Hacking Soft Skills Online Piracy Domain Denial of Service Attack (DOS) Cyberattack Security Macro Virus
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cybercrime
CIS Critical Security Controls
Cybervandalism
Technical
Skills
Law
Takedown
Notice
Session
Hijacking
Cybersecurity
Framework
Vulnerability
Social Engineering
Malware
Security
Breaches
Availability
Authorization
Privacy
Risk
Authentication
Confidentiality
Hacker
Term of
Service
Ethics
Phising
Threat
Spoofing
Integrity
Malware
Hacking
Soft Skills
Online Piracy
Domain
Denial of Service
Attack (DOS)
Cyberattack
Security
Macro
Virus