SpearPhishingPassPhraseRiskAssessmentDataDiscoveryPatchManagementSecurePasswordTypesofHackersAdvancedPersistentThreatDetectTwo-FactorAuthenticationProtectAntivirusRespondIdentifyAssetManagementRecoverSecureEmailRansomwareSecurityAwarenessTrainingVPNPhishingLeastPrivilegeMalwareFirewallSpearPhishingPassPhraseRiskAssessmentDataDiscoveryPatchManagementSecurePasswordTypesofHackersAdvancedPersistentThreatDetectTwo-FactorAuthenticationProtectAntivirusRespondIdentifyAssetManagementRecoverSecureEmailRansomwareSecurityAwarenessTrainingVPNPhishingLeastPrivilegeMalwareFirewall

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Spear Phishing
  2. PassPhrase
  3. Risk Assessment
  4. Data Discovery
  5. Patch Management
  6. Secure Password
  7. Types of Hackers
  8. Advanced Persistent Threat
  9. Detect
  10. Two-Factor Authentication
  11. Protect
  12. Antivirus
  13. Respond
  14. Identify
  15. Asset Management
  16. Recover
  17. Secure Email
  18. Ransomware
  19. Security Awareness Training
  20. VPN
  21. Phishing
  22. Least Privilege
  23. Malware
  24. Firewall