VishingAntivirusRespondPhishingSecurityAwarenessTrainingAssetManagementSpearPhishingIdentifysmishingTypesofHackersPassPhaseFirewallPatchManagementDataDiscoveryAdvancedPersistentThreatSecurePasswordProtectTwo-FactorAuthenticationSecureEmailRecoverSSLDecryptspearphishingDetectZeroDay WhalingLeastPrivilegeMalwareRiskAssessmentVPNVishingAntivirusRespondPhishingSecurityAwarenessTrainingAssetManagementSpearPhishingIdentifysmishingTypesofHackersPassPhaseFirewallPatchManagementDataDiscoveryAdvancedPersistentThreatSecurePasswordProtectTwo-FactorAuthenticationSecureEmailRecoverSSLDecryptspearphishingDetectZeroDay WhalingLeastPrivilegeMalwareRiskAssessmentVPN

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Vishing
  2. Antivirus
  3. Respond
  4. Phishing
  5. Security Awareness Training
  6. Asset Management
  7. Spear Phishing
  8. Identify
  9. smishing
  10. Types of Hackers
  11. PassPhase
  12. Firewall
  13. Patch Management
  14. Data Discovery
  15. Advanced Persistent Threat
  16. Secure Password
  17. Protect
  18. Two-Factor Authentication
  19. Secure Email
  20. Recover
  21. SSL Decrypt
  22. spearphishing
  23. Detect
  24. Zero Day
  25. Whaling
  26. Least Privilege
  27. Malware
  28. Risk Assessment
  29. VPN