SecurePasswordDetectRecoverAssetManagementIdentifyFirewallPatchManagementRespondSecureEmailMalwareAdvancedPersistentThreatAntivirusRansomwareDataDiscoveryRiskAssessmentVPNTypesofHackersPassPhraseLeastPrivilegeSpearPhishingProtectPhishingTwo-FactorAuthenticationSecurityAwarenessTrainingSecurePasswordDetectRecoverAssetManagementIdentifyFirewallPatchManagementRespondSecureEmailMalwareAdvancedPersistentThreatAntivirusRansomwareDataDiscoveryRiskAssessmentVPNTypesofHackersPassPhraseLeastPrivilegeSpearPhishingProtectPhishingTwo-FactorAuthenticationSecurityAwarenessTraining

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Secure Password
  2. Detect
  3. Recover
  4. Asset Management
  5. Identify
  6. Firewall
  7. Patch Management
  8. Respond
  9. Secure Email
  10. Malware
  11. Advanced Persistent Threat
  12. Antivirus
  13. Ransomware
  14. Data Discovery
  15. Risk Assessment
  16. VPN
  17. Types of Hackers
  18. PassPhrase
  19. Least Privilege
  20. Spear Phishing
  21. Protect
  22. Phishing
  23. Two-Factor Authentication
  24. Security Awareness Training