spearphishingsmishingAssetManagementSecurePasswordVPNDetectProtectWhalingSecurityAwarenessTrainingPassPhaseSecureEmailAntivirusAdvancedPersistentThreatTypesofHackersLeastPrivilegeZeroDay FirewallMalwareRespondRiskAssessmentRecoverVishingSpearPhishingTwo-FactorAuthenticationSSLDecryptIdentifyDataDiscoveryPhishingPatchManagementspearphishingsmishingAssetManagementSecurePasswordVPNDetectProtectWhalingSecurityAwarenessTrainingPassPhaseSecureEmailAntivirusAdvancedPersistentThreatTypesofHackersLeastPrivilegeZeroDay FirewallMalwareRespondRiskAssessmentRecoverVishingSpearPhishingTwo-FactorAuthenticationSSLDecryptIdentifyDataDiscoveryPhishingPatchManagement

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. spearphishing
  2. smishing
  3. Asset Management
  4. Secure Password
  5. VPN
  6. Detect
  7. Protect
  8. Whaling
  9. Security Awareness Training
  10. PassPhase
  11. Secure Email
  12. Antivirus
  13. Advanced Persistent Threat
  14. Types of Hackers
  15. Least Privilege
  16. Zero Day
  17. Firewall
  18. Malware
  19. Respond
  20. Risk Assessment
  21. Recover
  22. Vishing
  23. Spear Phishing
  24. Two-Factor Authentication
  25. SSL Decrypt
  26. Identify
  27. Data Discovery
  28. Phishing
  29. Patch Management