(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
An attack that employs brute force methods to compromise, degrade, or destroy systems, networks, or services.
Attrition Attack
Free!
The loss or theft of a computing device or media used by the organization.
Loss or Theft of Equipment
about ensuring that data has not been tampered with and, therefore, can be trusted. It is correct, authentic, and reliable.
Integrity
An attack involving replacement of legitimate content/services with a malicious substitute.
Impersonation/Spoofing Attack
authorized users have timely, reliable access to resources when they are needed.
Availability
is the practice of keeping data or information secure from unauthorized or unwarranted access.
Information Security
Any incident resulting from a violation of an organization’s acceptable usage policies by an authorized user, excluding the above categories.
Improper Usage Attack
Confidentiality, Availability, Integrity
CIA Triad
An attack executed from removable media or a peripheral device.
External/Removable media attack
It is an incident response team similar to CERT
CSRIT
refers to an organization’s efforts to keep their data private or secret.
Confidentiality
An attack executed from a website or web-based application.
Web Attack
An attack executed via an email message or attachment.
Email/Phishing Attack
United States Computer Emergency Readiness Team
CERT
the practice of protecting computers, networks, or devices from malicious digital attacks.
Cyber Security