VPNPhishingAdvancedPersistentThreatSecurePasswordSecurityAwarenessTrainingTypesofHackersMalwareRespondDetectSpearPhishingLeastPrivilegeAssetManagementPatchManagementFirewallAntivirusSecureEmailDataDiscoveryTwo-FactorAuthenticationRecoverRiskAssessmentPassPhraseIdentifyRansomwareProtectVPNPhishingAdvancedPersistentThreatSecurePasswordSecurityAwarenessTrainingTypesofHackersMalwareRespondDetectSpearPhishingLeastPrivilegeAssetManagementPatchManagementFirewallAntivirusSecureEmailDataDiscoveryTwo-FactorAuthenticationRecoverRiskAssessmentPassPhraseIdentifyRansomwareProtect

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. VPN
  2. Phishing
  3. Advanced Persistent Threat
  4. Secure Password
  5. Security Awareness Training
  6. Types of Hackers
  7. Malware
  8. Respond
  9. Detect
  10. Spear Phishing
  11. Least Privilege
  12. Asset Management
  13. Patch Management
  14. Firewall
  15. Antivirus
  16. Secure Email
  17. Data Discovery
  18. Two-Factor Authentication
  19. Recover
  20. Risk Assessment
  21. PassPhrase
  22. Identify
  23. Ransomware
  24. Protect