This bingo card has a free space and 71 words: Data Breach, Whitelist, Allowlist, Anti-BotnetEncryption, Process Hollowing, AdwareDDoS, Virus, BYOL, Brute Force Attack, Keylogger, PII, Hacker, CybersecurityScareware, Firewall, BYOD, Two-step Authentification, Threat Assessment, Threat Hunting, Secure Socket Layer (SSL), Spam, White Hat - Black Hat, Digital Transformation, MITRE ATT&CK™ Framework, Rootkit, Data IntegrityParental Controls, Backdoor, BYOCIdentity, Fileless Malware, Anti-Virus, Spyware, Social Engineering, Honeypot, Clickjacking, Clientless, Vulnerability, Exploit, Malvertising, Insider Threat, Attack Vector, Botnet, Business Continuity Plan, Patch, MalwareVPNBusiness Disruption, Drive By Download Attack, Anti-Malware, Threat Intelligence, Remote Desktop Protocol (RDP), Dark Web, Greylist, Data LossPrevention (DLP)Digital ForensicsSpear Phishing, Authentication, CAPTCHA, Banker Trojan, WAFMan-in-theMiddle Attack, Data Theft, Security Incident Response, Risktool, SIM Swapping, Decryption, Ransomware, Fast Identity Online (FIDO), Endpoint ProtectionSpoofing, Zero-day Exploit, Cryptojacking, Critical InfrastructureSECaaS, Phishing, In-line Network Device, IoT, Cyberbullying, Pen Testing, Sandbox(ing) and Anti-Phishing.
CSAM 2023 Cyber Definitions Bingo | Cyber Security Bingo | Cybersecurity Terms Bingo | RGL Cybersecurity Bingo | RGL Cybersecurity Bingo
Share this URL with your players:
For more control of your online game, create a clone of this card first.
Learn how to conduct a bingo game.
With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.
Tip: If you want your game to last longer (on average), add more unique words/images to it.