Email Virus Patch Cryptojacking Free! Spoof Ransomware Privacy Settings Encryption Credential Stuffing Air Gap Hardware Internet of Things Red Team Smishing Network Trojan Horse Spam Private Key VPN Tailgating Backdoor Cryptography Penetration Testing DDoS Phishing Username Public Key Whitelist Access Point Worm Dark Web Keylogger Risk Spyware Removal Tool Zero Day Threat Hacker Strong Passwords Breach Malware Cyberspace Spyware Access Control Data Breach Rootkit Digital Footprint Adware 2FA Payload Social Engineering Sandboxing Block Cyber Bullying Safe Websites Buffer Overflow Cloud Botnet Personal Data Firewall Brute Force Attack Email Virus Patch Cryptojacking Free! Spoof Ransomware Privacy Settings Encryption Credential Stuffing Air Gap Hardware Internet of Things Red Team Smishing Network Trojan Horse Spam Private Key VPN Tailgating Backdoor Cryptography Penetration Testing DDoS Phishing Username Public Key Whitelist Access Point Worm Dark Web Keylogger Risk Spyware Removal Tool Zero Day Threat Hacker Strong Passwords Breach Malware Cyberspace Spyware Access Control Data Breach Rootkit Digital Footprint Adware 2FA Payload Social Engineering Sandboxing Block Cyber Bullying Safe Websites Buffer Overflow Cloud Botnet Personal Data Firewall Brute Force Attack
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
R-Email
C-Virus
E-Patch
R-Cryptojacking
B-Free!
C-Spoof
B-Ransomware
E-Privacy Settings
R-Encryption
C-Credential Stuffing
E-Air Gap
E-Hardware
Y-Internet of Things
B-Red Team
E-Smishing
E-Network
C-Trojan Horse
Y-Spam
C-Private Key
Y-VPN
C-Tailgating
R-Backdoor
Y-Cryptography
R-Penetration Testing
Y-DDoS
E-Phishing
R-Username
Y-Public Key
R-Whitelist
E-Access Point
B-Worm
C-Dark Web
E-Keylogger
C-Risk
Y-Spyware Removal Tool
B-Zero Day
E-Threat
E-Hacker
E-Strong Passwords
R-Breach
B-Malware
R-Cyberspace
Y-Spyware
B-Access Control
C-Data Breach
R-Rootkit
C-Digital Footprint
C-Adware
C-2FA
Y-Payload
B-Social Engineering
C-Sandboxing
B-Block
R-Cyber Bullying
B-Safe Websites
R-Buffer Overflow
Y-Cloud
B-Botnet
Y-Personal Data
Y-Firewall
B-Brute Force Attack