AntivirusAdvancedPersistentThreatVPNTwo-FactorAuthenticationRiskAssessmentRecoverTypesofHackersPatchManagementsmishingSpearPhishingVishingPhishingspearphishingIdentifyWhalingPassPhaseDataDiscoveryAssetManagementFirewallDetectProtectLeastPrivilegeMalwareSecureEmailSecurePasswordZeroDay RespondSecurityAwarenessTrainingSSLDecryptAntivirusAdvancedPersistentThreatVPNTwo-FactorAuthenticationRiskAssessmentRecoverTypesofHackersPatchManagementsmishingSpearPhishingVishingPhishingspearphishingIdentifyWhalingPassPhaseDataDiscoveryAssetManagementFirewallDetectProtectLeastPrivilegeMalwareSecureEmailSecurePasswordZeroDay RespondSecurityAwarenessTrainingSSLDecrypt

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Antivirus
  2. Advanced Persistent Threat
  3. VPN
  4. Two-Factor Authentication
  5. Risk Assessment
  6. Recover
  7. Types of Hackers
  8. Patch Management
  9. smishing
  10. Spear Phishing
  11. Vishing
  12. Phishing
  13. spearphishing
  14. Identify
  15. Whaling
  16. PassPhase
  17. Data Discovery
  18. Asset Management
  19. Firewall
  20. Detect
  21. Protect
  22. Least Privilege
  23. Malware
  24. Secure Email
  25. Secure Password
  26. Zero Day
  27. Respond
  28. Security Awareness Training
  29. SSL Decrypt