Dark Web Backdoor White Hat - Black Hat Adware Threat Assessment Decryption Cybersecurity Fast Identity Online (FIDO) Drive By Download Attack Digital Forensics Scareware In-line Network Device Risktool Sandbox(ing) Cryptojacking Hacker BYOD Critical Infrastructure Banker Trojan Spoofing WAF Whitelist, Allowlist Threat Intelligence Identity Threat Hunting Fileless Malware Firewall Data Integrity Patch Clickjacking Greylist Secure Socket Layer (SSL) Remote Desktop Protocol (RDP) Spam Data Breach Encryption Process Hollowing Keylogger Rootkit Ransomware Malvertising Social Engineering VPN PII Pen Testing Vulnerability Man-in- theMiddle Attack Zero- day Exploit SIM Swapping Authentication Spear Phishing IoT CAPTCHA BYOL Virus Phishing Parental Controls Botnet DDoS SECaaS Two-step Authentification Clientless Indicators of Compromise (IOC) Spyware Two-factor Authentification Identity and Access Management (IAM) Business Continuity Plan Brute Force Attack Data LossPrevention (DLP) Exploit Honeypot Insider Threat Digital Transformation Dark Web Backdoor White Hat - Black Hat Adware Threat Assessment Decryption Cybersecurity Fast Identity Online (FIDO) Drive By Download Attack Digital Forensics Scareware In-line Network Device Risktool Sandbox(ing) Cryptojacking Hacker BYOD Critical Infrastructure Banker Trojan Spoofing WAF Whitelist, Allowlist Threat Intelligence Identity Threat Hunting Fileless Malware Firewall Data Integrity Patch Clickjacking Greylist Secure Socket Layer (SSL) Remote Desktop Protocol (RDP) Spam Data Breach Encryption Process Hollowing Keylogger Rootkit Ransomware Malvertising Social Engineering VPN PII Pen Testing Vulnerability Man-in- theMiddle Attack Zero- day Exploit SIM Swapping Authentication Spear Phishing IoT CAPTCHA BYOL Virus Phishing Parental Controls Botnet DDoS SECaaS Two-step Authentification Clientless Indicators of Compromise (IOC) Spyware Two-factor Authentification Identity and Access Management (IAM) Business Continuity Plan Brute Force Attack Data LossPrevention (DLP) Exploit Honeypot Insider Threat Digital Transformation
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Dark Web
Backdoor
White Hat - Black Hat
Adware
Threat Assessment
Decryption
Cybersecurity
Fast Identity Online (FIDO)
Drive By Download Attack
Digital Forensics
Scareware
In-line Network Device
Risktool
Sandbox(ing)
Cryptojacking
Hacker
BYOD
Critical Infrastructure
Banker Trojan
Spoofing
WAF
Whitelist, Allowlist
Threat Intelligence
Identity
Threat Hunting
Fileless Malware
Firewall
Data Integrity
Patch
Clickjacking
Greylist
Secure Socket Layer (SSL)
Remote Desktop Protocol (RDP)
Spam
Data Breach
Encryption
Process Hollowing
Keylogger
Rootkit
Ransomware
Malvertising
Social Engineering
VPN
PII
Pen Testing
Vulnerability
Man-in-theMiddle Attack
Zero-day Exploit
SIM Swapping
Authentication
Spear Phishing
IoT
CAPTCHA
BYOL
Virus
Phishing
Parental Controls
Botnet
DDoS
SECaaS
Two-step Authentification
Clientless
Indicators of Compromise (IOC)
Spyware
Two-factor Authentification
Identity and Access Management (IAM)
Business Continuity Plan
Brute Force Attack
Data LossPrevention (DLP)
Exploit
Honeypot
Insider Threat
Digital Transformation