Malware Botnet Tailgating Personal Data Sandboxing Spyware Removal Tool Cryptography Payload Adware Public Key Cloud Access Point Strong Passwords Firewall Privacy Settings Hardware Spam Hacker Spoof Zero Day Credential Stuffing Cyber Bullying Rootkit Keylogger Spyware Threat Air Gap Phishing Smishing Virus Brute Force Attack Encryption Backdoor VPN Digital Footprint Worm Safe Websites Patch Access Control Free! Data Breach Email Private Key Buffer Overflow Cyberspace Dark Web DDoS Risk Block Whitelist Trojan Horse 2FA Social Engineering Internet of Things Username Network Penetration Testing Red Team Ransomware Cryptojacking Breach Malware Botnet Tailgating Personal Data Sandboxing Spyware Removal Tool Cryptography Payload Adware Public Key Cloud Access Point Strong Passwords Firewall Privacy Settings Hardware Spam Hacker Spoof Zero Day Credential Stuffing Cyber Bullying Rootkit Keylogger Spyware Threat Air Gap Phishing Smishing Virus Brute Force Attack Encryption Backdoor VPN Digital Footprint Worm Safe Websites Patch Access Control Free! Data Breach Email Private Key Buffer Overflow Cyberspace Dark Web DDoS Risk Block Whitelist Trojan Horse 2FA Social Engineering Internet of Things Username Network Penetration Testing Red Team Ransomware Cryptojacking Breach
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B-Malware
B-Botnet
C-Tailgating
Y-Personal Data
C-Sandboxing
Y-Spyware Removal Tool
Y-Cryptography
Y-Payload
C-Adware
Y-Public Key
Y-Cloud
E-Access Point
E-Strong Passwords
Y-Firewall
E-Privacy Settings
E-Hardware
Y-Spam
E-Hacker
C-Spoof
B-Zero Day
C-Credential Stuffing
R-Cyber Bullying
R-Rootkit
E-Keylogger
Y-Spyware
E-Threat
E-Air Gap
E-Phishing
E-Smishing
C-Virus
B-Brute Force Attack
R-Encryption
R-Backdoor
Y-VPN
C-Digital Footprint
B-Worm
B-Safe Websites
E-Patch
B-Access Control
B-Free!
C-Data Breach
R-Email
C-Private Key
R-Buffer Overflow
R-Cyberspace
C-Dark Web
Y-DDoS
C-Risk
B-Block
R-Whitelist
C-Trojan Horse
C-2FA
B-Social Engineering
Y-Internet of Things
R-Username
E-Network
R-Penetration Testing
B-Red Team
B-Ransomware
R-Cryptojacking
R-Breach