Backdoor Privacy Settings Ransomware Digital Footprint Encryption Worm Red Team Social Engineering Spyware Cyber Bullying Sandboxing Botnet Penetration Testing Threat DDoS 2FA Patch Buffer Overflow Phishing Personal Data Safe Websites Cyberspace Risk Malware Spam Network Access Point Brute Force Attack Cloud Spoof Username Virus Access Control Zero Day Private Key Public Key Cryptography Strong Passwords Firewall Payload VPN Air Gap Keylogger Hardware Email Internet of Things Whitelist Credential Stuffing Rootkit Dark Web Block Adware Hacker Smishing Spyware Removal Tool Free! Data Breach Tailgating Trojan Horse Cryptojacking Breach Backdoor Privacy Settings Ransomware Digital Footprint Encryption Worm Red Team Social Engineering Spyware Cyber Bullying Sandboxing Botnet Penetration Testing Threat DDoS 2FA Patch Buffer Overflow Phishing Personal Data Safe Websites Cyberspace Risk Malware Spam Network Access Point Brute Force Attack Cloud Spoof Username Virus Access Control Zero Day Private Key Public Key Cryptography Strong Passwords Firewall Payload VPN Air Gap Keylogger Hardware Email Internet of Things Whitelist Credential Stuffing Rootkit Dark Web Block Adware Hacker Smishing Spyware Removal Tool Free! Data Breach Tailgating Trojan Horse Cryptojacking Breach
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
R-Backdoor
E-Privacy Settings
B-Ransomware
C-Digital Footprint
R-Encryption
B-Worm
B-Red Team
B-Social Engineering
Y-Spyware
R-Cyber Bullying
C-Sandboxing
B-Botnet
R-Penetration Testing
E-Threat
Y-DDoS
C-2FA
E-Patch
R-Buffer Overflow
E-Phishing
Y-Personal Data
B-Safe Websites
R-Cyberspace
C-Risk
B-Malware
Y-Spam
E-Network
E-Access Point
B-Brute Force Attack
Y-Cloud
C-Spoof
R-Username
C-Virus
B-Access Control
B-Zero Day
C-Private Key
Y-Public Key
Y-Cryptography
E-Strong Passwords
Y-Firewall
Y-Payload
Y-VPN
E-Air Gap
E-Keylogger
E-Hardware
R-Email
Y-Internet of Things
R-Whitelist
C-Credential Stuffing
R-Rootkit
C-Dark Web
B-Block
C-Adware
E-Hacker
E-Smishing
Y-Spyware Removal Tool
B-Free!
C-Data Breach
C-Tailgating
C-Trojan Horse
R-Cryptojacking
R-Breach