Anti- Virus Dictionary Attack Hacker Attack Spoofing Device Social Engineering Password Personal Information Internet of Things Phishing Phishing Network Device Brute Force IP Address Social Engineering Cryptojacking Password Ransomware Trojan Horse Trojan Horse DDos Drive-by Downloads Ransomware Personal Information Brute Force Data Drive-by Downloads Dictionary Attack Password Malware Internet of Things Attack Malware Vulnerability Network SPAM Cryptojacking Data e- mail DDos Spoofing Anti- Virus Dictionary Attack Hacker Attack Spoofing Device Social Engineering Password Personal Information Internet of Things Phishing Phishing Network Device Brute Force IP Address Social Engineering Cryptojacking Password Ransomware Trojan Horse Trojan Horse DDos Drive-by Downloads Ransomware Personal Information Brute Force Data Drive-by Downloads Dictionary Attack Password Malware Internet of Things Attack Malware Vulnerability Network SPAM Cryptojacking Data e- mail DDos Spoofing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Anti-Virus
Dictionary Attack
Hacker
Attack
Spoofing
Device
Social Engineering
Password
Personal Information
Internet of Things
Phishing
Phishing
Network
Device
Brute Force
IP Address
Social Engineering
Cryptojacking
Password
Ransomware
Trojan Horse
Trojan Horse
DDos
Drive-by Downloads
Ransomware
Personal Information
Brute Force
Data
Drive-by Downloads
Dictionary Attack
Password
Malware
Internet of Things
Attack
Malware
Vulnerability
Network
SPAM
Cryptojacking
Data
e-mail
DDos
Spoofing