Key Cyber Terrain Malicious Insider Mission Impact Software Assurance Cyber Posture Mitigations Mission Essential Functions Cyber Vulnerability Cyber Threat Mission Model Modeling and Simulation Red Team MOE System Model Attack Threat/Path/Context FOUO Emulation Killchain Cyber Risk Assessment Cyber Resiliency Demonstrated Hypothesized Supply Chain Resiliency Resilience Key Cyber Terrain Malicious Insider Mission Impact Software Assurance Cyber Posture Mitigations Mission Essential Functions Cyber Vulnerability Cyber Threat Mission Model Modeling and Simulation Red Team MOE System Model Attack Threat/Path/Context FOUO Emulation Killchain Cyber Risk Assessment Cyber Resiliency Demonstrated Hypothesized Supply Chain Resiliency Resilience
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Key
Cyber
Terrain
Malicious Insider
Mission Impact
Software Assurance
Cyber Posture
Mitigations
Mission Essential Functions
Cyber Vulnerability
Cyber Threat
Mission Model
Modeling and Simulation
Red Team
MOE
System Model
Attack Threat/Path/Context
FOUO
Emulation
Killchain
Cyber Risk Assessment
Cyber Resiliency
Demonstrated
Hypothesized
Supply Chain
Resiliency
Resilience