Hacking monkey123 Biometrics Trojan Horse Malware Cyber- Bullying Virus Compromised Smart Devices Whd@b33f? Anti- Virus (PII) Online Fraud 2FA Flash Drive Spam Mobile Devices Malicious links Phishing Encryption Images Identity theft iPhone Cipher Siri Decryption Backup Cybersecurity Credit Card # Hacking monkey123 Biometrics Trojan Horse Malware Cyber- Bullying Virus Compromised Smart Devices Whd@b33f? Anti- Virus (PII) Online Fraud 2FA Flash Drive Spam Mobile Devices Malicious links Phishing Encryption Images Identity theft iPhone Cipher Siri Decryption Backup Cybersecurity Credit Card #
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B-Hacking
R-monkey123
E-Biometrics
Y-Trojan Horse
C-Malware
B-Cyber-
Bullying
C-Virus
C-Compromised
Y-Smart Devices
E-Whd@b33f?
R-Anti-Virus
Y-(PII)
R-Online Fraud
B-2FA
Y-Flash Drive
Y-Spam
C-Mobile Devices
E-Malicious links
Y-Phishing
B-Encryption
R-Images
C-Identity theft
R-iPhone
C-Cipher
E-Siri
E-Decryption
B-Backup
E-Cybersecurity
R-Credit Card #