Hacker Trojan Horse Cryptojacking Privacy Settings Access Point Cyberspace Rootkit Breach Email Credential Stuffing Free! Whitelist Malware Payload Risk Threat Spam Spyware Removal Tool Encryption Brute Force Attack Air Gap 2FA VPN Keylogger Cryptography Hardware Tailgating Access Control Patch Botnet Cyber Bullying Ransomware Red Team Personal Data Digital Footprint Spyware Buffer Overflow Adware Backdoor Phishing Strong Passwords Internet of Things Username Zero Day Data Breach Block DDoS Dark Web Safe Websites Smishing Private Key Network Penetration Testing Worm Firewall Virus Social Engineering Cloud Public Key Sandboxing Spoof Hacker Trojan Horse Cryptojacking Privacy Settings Access Point Cyberspace Rootkit Breach Email Credential Stuffing Free! Whitelist Malware Payload Risk Threat Spam Spyware Removal Tool Encryption Brute Force Attack Air Gap 2FA VPN Keylogger Cryptography Hardware Tailgating Access Control Patch Botnet Cyber Bullying Ransomware Red Team Personal Data Digital Footprint Spyware Buffer Overflow Adware Backdoor Phishing Strong Passwords Internet of Things Username Zero Day Data Breach Block DDoS Dark Web Safe Websites Smishing Private Key Network Penetration Testing Worm Firewall Virus Social Engineering Cloud Public Key Sandboxing Spoof
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
E-Hacker
C-Trojan Horse
R-Cryptojacking
E-Privacy Settings
E-Access Point
R-Cyberspace
R-Rootkit
R-Breach
R-Email
C-Credential Stuffing
B-Free!
R-Whitelist
B-Malware
Y-Payload
C-Risk
E-Threat
Y-Spam
Y-Spyware Removal Tool
R-Encryption
B-Brute Force Attack
E-Air Gap
C-2FA
Y-VPN
E-Keylogger
Y-Cryptography
E-Hardware
C-Tailgating
B-Access Control
E-Patch
B-Botnet
R-Cyber Bullying
B-Ransomware
B-Red Team
Y-Personal Data
C-Digital Footprint
Y-Spyware
R-Buffer Overflow
C-Adware
R-Backdoor
E-Phishing
E-Strong Passwords
Y-Internet of Things
R-Username
B-Zero Day
C-Data Breach
B-Block
Y-DDoS
C-Dark Web
B-Safe Websites
E-Smishing
C-Private Key
E-Network
R-Penetration Testing
B-Worm
Y-Firewall
C-Virus
B-Social Engineering
Y-Cloud
Y-Public Key
C-Sandboxing
C-Spoof