InternetFraudeNCSCTrojanhorseVulnerabilitySpoofingMalwareSoftwarerisicoSSOImpactKwetsbaar-heidMitigatieCyberThreatRiskassessmentWachtwoordBeveiligingPrivacyMulti-factorauthenticationHardwareLekJavaServiceDeskCyberTrojanFirewallupdatenCloudsupportCVE"Patch"esO'HoulihanApacheEncryptiePhishingWormVPNFirewallInternetFraudeNCSCTrojanhorseVulnerabilitySpoofingMalwareSoftwarerisicoSSOImpactKwetsbaar-heidMitigatieCyberThreatRiskassessmentWachtwoordBeveiligingPrivacyMulti-factorauthenticationHardwareLekJavaServiceDeskCyberTrojanFirewallupdatenCloudsupportCVE"Patch"esO'HoulihanApacheEncryptiePhishingWormVPNFirewall

IT-informatiesessie kwetsbaarheid Log4j - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. Internet
  2. Fraude
  3. NCSC
  4. Trojan horse
  5. Vulnerability
  6. Spoofing
  7. Malware
  8. Software
  9. risico
  10. SSO
  11. Impact
  12. Kwetsbaar-heid
  13. Mitigatie
  14. Cyber
  15. Threat
  16. Risk assessment
  17. Wachtwoord
  18. Beveiliging
  19. Privacy
  20. Multi-factor authentication
  21. Hardware
  22. Lek
  23. Java
  24. Service Desk
  25. Cyber
  26. Trojan
  27. Firewall
  28. updaten
  29. Cloud
  30. support
  31. CVE
  32. "Patch"es O'Houlihan
  33. Apache
  34. Encryptie
  35. Phishing
  36. Worm
  37. VPN
  38. Firewall