Process Hollowing Firewall Adware Exploit Keylogger Cybersecurity PII Spoofing Zero- day Exploit Rootkit Fast Identity Online (FIDO) Pen Testing Ransomware Authentication Cryptojacking Man-in- theMiddle Attack Clientless Sandbox(ing) Digital Forensics Risktool Malvertising Whitelist, Allowlist Remote Desktop Protocol (RDP) Vulnerability Drive By Download Attack Social Engineering Banker Trojan Critical Infrastructure In-line Network Device VPN Virus Encryption Insider Threat Patch Scareware SECaaS White Hat - Black Hat Spyware Parental Controls Data Integrity SIM Swapping WAF Secure Socket Layer (SSL) Two-factor Authentification Identity Decryption DDoS Threat Hunting Identity and Access Management (IAM) Two-step Authentification Fileless Malware Spam Indicators of Compromise (IOC) Threat Intelligence Backdoor Brute Force Attack Hacker IoT BYOL CAPTCHA Data LossPrevention (DLP) Clickjacking Threat Assessment Phishing Data Breach Spear Phishing Business Continuity Plan Dark Web Greylist Botnet Digital Transformation Honeypot BYOD Process Hollowing Firewall Adware Exploit Keylogger Cybersecurity PII Spoofing Zero- day Exploit Rootkit Fast Identity Online (FIDO) Pen Testing Ransomware Authentication Cryptojacking Man-in- theMiddle Attack Clientless Sandbox(ing) Digital Forensics Risktool Malvertising Whitelist, Allowlist Remote Desktop Protocol (RDP) Vulnerability Drive By Download Attack Social Engineering Banker Trojan Critical Infrastructure In-line Network Device VPN Virus Encryption Insider Threat Patch Scareware SECaaS White Hat - Black Hat Spyware Parental Controls Data Integrity SIM Swapping WAF Secure Socket Layer (SSL) Two-factor Authentification Identity Decryption DDoS Threat Hunting Identity and Access Management (IAM) Two-step Authentification Fileless Malware Spam Indicators of Compromise (IOC) Threat Intelligence Backdoor Brute Force Attack Hacker IoT BYOL CAPTCHA Data LossPrevention (DLP) Clickjacking Threat Assessment Phishing Data Breach Spear Phishing Business Continuity Plan Dark Web Greylist Botnet Digital Transformation Honeypot BYOD
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Process Hollowing
Firewall
Adware
Exploit
Keylogger
Cybersecurity
PII
Spoofing
Zero-day Exploit
Rootkit
Fast Identity Online (FIDO)
Pen Testing
Ransomware
Authentication
Cryptojacking
Man-in-theMiddle Attack
Clientless
Sandbox(ing)
Digital Forensics
Risktool
Malvertising
Whitelist, Allowlist
Remote Desktop Protocol (RDP)
Vulnerability
Drive By Download Attack
Social Engineering
Banker Trojan
Critical Infrastructure
In-line Network Device
VPN
Virus
Encryption
Insider Threat
Patch
Scareware
SECaaS
White Hat - Black Hat
Spyware
Parental Controls
Data Integrity
SIM Swapping
WAF
Secure Socket Layer (SSL)
Two-factor Authentification
Identity
Decryption
DDoS
Threat Hunting
Identity and Access Management (IAM)
Two-step Authentification
Fileless Malware
Spam
Indicators of Compromise (IOC)
Threat Intelligence
Backdoor
Brute Force Attack
Hacker
IoT
BYOL
CAPTCHA
Data LossPrevention (DLP)
Clickjacking
Threat Assessment
Phishing
Data Breach
Spear Phishing
Business Continuity Plan
Dark Web
Greylist
Botnet
Digital Transformation
Honeypot
BYOD