Pen-testVulnerabilityDDoSBackdoorFirewallVPNWhalePhishingWhiteHatCAPTCHABlackhatAntivirusPhishingZero-dayPatchManagementCloudWormSecurityAwarenessTrainingEncryptionLeastPrivilegeCookieTwo-FactorAuthenticationRansomwareRiskAssessmentTrojanhorseBruteforceattackPen-testVulnerabilityDDoSBackdoorFirewallVPNWhalePhishingWhiteHatCAPTCHABlackhatAntivirusPhishingZero-dayPatchManagementCloudWormSecurityAwarenessTrainingEncryptionLeastPrivilegeCookieTwo-FactorAuthenticationRansomwareRiskAssessmentTrojanhorseBruteforceattack

SECURITY BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Pen-test
  2. Vulnerability
  3. DDoS
  4. Backdoor
  5. Firewall
  6. VPN
  7. Whale Phishing
  8. White Hat
  9. CAPTCHA
  10. Black hat
  11. Antivirus
  12. Phishing
  13. Zero-day
  14. Patch Management
  15. Cloud
  16. Worm
  17. Security Awareness Training
  18. Encryption
  19. Least Privilege
  20. Cookie
  21. Two-Factor Authentication
  22. Ransomware
  23. Risk Assessment
  24. Trojan horse
  25. Brute force attack