TypesofHackersAssetManagementVPNAntivirusSecureEmailPhishingLeastPrivilegePatchManagementDetectMalwareSecurePasswordSSLDecryptRiskAssessmentFirewallAdvancedPersistentThreatPassPhaseIdentifyTwo-FactorAuthenticationRecoverSpearPhishingProtectDataDiscoveryRespondSecurityAwarenessTrainingTypesofHackersAssetManagementVPNAntivirusSecureEmailPhishingLeastPrivilegePatchManagementDetectMalwareSecurePasswordSSLDecryptRiskAssessmentFirewallAdvancedPersistentThreatPassPhaseIdentifyTwo-FactorAuthenticationRecoverSpearPhishingProtectDataDiscoveryRespondSecurityAwarenessTraining

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Types of Hackers
  2. Asset Management
  3. VPN
  4. Antivirus
  5. Secure Email
  6. Phishing
  7. Least Privilege
  8. Patch Management
  9. Detect
  10. Malware
  11. Secure Password
  12. SSL Decrypt
  13. Risk Assessment
  14. Firewall
  15. Advanced Persistent Threat
  16. PassPhase
  17. Identify
  18. Two-Factor Authentication
  19. Recover
  20. Spear Phishing
  21. Protect
  22. Data Discovery
  23. Respond
  24. Security Awareness Training