InfoSec Bingo

InfoSec Bingo Card
Preview

This bingo card has a free space and 60 words: IOT, ROOTKIT, ATTACK SURFACE, RANSOMWARE, SOCIAL ENGINEERING, ZERO-DAY, ENCRYPTION, VPN, SPOOFING, KEYLOGGER, WORM, FIREWALL, PHISH, ZOMBIE, BOTNET, APT, ANOMALY, AI, UBA, BYOD, CLOUD-BASED, ON-PREM, EDR, EPP, IOT, KILL CHAIN, MACHINE LEARNING, PUA/PUP, THREAT INTELLIGENCE, BLACKHAT, WHITEHAT, GRAYHAT, BREACH, BRUTE FORCE ATTACK, C2C, DDoS, EXPLOIT, HONEYPOT, SPEARPHISH, VULNERABILITY, SOC, NOC, THREAT HUNTING, METADATA, HEADERS, DOMAIN, PATCH, SOAR, DMZ, PCI, PASSWORD, CONFIDENTIALITY, INTEGRITY, AVAILABILITY, SIEM, 2FA, PENTEST, RED TEAM, BLUE TEAM and PURPLE TEAM.

⚠ This card has duplicate items: IOT (2)

More like this:

Briefing Bingo | Proofpoint Academy Bingo | Cyber Bingo | Cyber Security Bingo | Cyber Security Bingo

Play Online

Share this URL with your players:

For more control of your online game, create a clone of this card first.

Learn how to conduct a bingo game.

Call List

Probabilities

With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.

Tip: If you want your game to last longer (on average), add more unique words/images to it.