AntivirusIdentifyPatchManagementVPNRiskAssessmentRecoverDataDiscoveryTypesofHackersSpearPhishingRansomwareTwo-FactorAuthenticationFirewallLeastPrivilegeSecurityAwarenessTrainingAdvancedPersistentThreatDetectPhishingRespondAssetManagementSecurePasswordProtectMalwareSecureEmailPassPhraseAntivirusIdentifyPatchManagementVPNRiskAssessmentRecoverDataDiscoveryTypesofHackersSpearPhishingRansomwareTwo-FactorAuthenticationFirewallLeastPrivilegeSecurityAwarenessTrainingAdvancedPersistentThreatDetectPhishingRespondAssetManagementSecurePasswordProtectMalwareSecureEmailPassPhrase

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Antivirus
  2. Identify
  3. Patch Management
  4. VPN
  5. Risk Assessment
  6. Recover
  7. Data Discovery
  8. Types of Hackers
  9. Spear Phishing
  10. Ransomware
  11. Two-Factor Authentication
  12. Firewall
  13. Least Privilege
  14. Security Awareness Training
  15. Advanced Persistent Threat
  16. Detect
  17. Phishing
  18. Respond
  19. Asset Management
  20. Secure Password
  21. Protect
  22. Malware
  23. Secure Email
  24. PassPhrase