smishingFirewallRespondSpearPhishingTypesofHackersLeastPrivilegeSecureEmailDetectAssetManagementspearphishingZeroDay PassPhaseIdentifySecurePasswordRecoverSecurityAwarenessTrainingAdvancedPersistentThreatVishingDataDiscoveryWhalingTwo-FactorAuthenticationPatchManagementSSLDecryptAntivirusVPNMalwareRiskAssessmentProtectPhishingsmishingFirewallRespondSpearPhishingTypesofHackersLeastPrivilegeSecureEmailDetectAssetManagementspearphishingZeroDay PassPhaseIdentifySecurePasswordRecoverSecurityAwarenessTrainingAdvancedPersistentThreatVishingDataDiscoveryWhalingTwo-FactorAuthenticationPatchManagementSSLDecryptAntivirusVPNMalwareRiskAssessmentProtectPhishing

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. smishing
  2. Firewall
  3. Respond
  4. Spear Phishing
  5. Types of Hackers
  6. Least Privilege
  7. Secure Email
  8. Detect
  9. Asset Management
  10. spearphishing
  11. Zero Day
  12. PassPhase
  13. Identify
  14. Secure Password
  15. Recover
  16. Security Awareness Training
  17. Advanced Persistent Threat
  18. Vishing
  19. Data Discovery
  20. Whaling
  21. Two-Factor Authentication
  22. Patch Management
  23. SSL Decrypt
  24. Antivirus
  25. VPN
  26. Malware
  27. Risk Assessment
  28. Protect
  29. Phishing