Indicators ofCompromise(IOC)BruteForceAttackDecryptionIn-lineNetworkDeviceWAFMalvertisingDrive ByDownloadAttackEncryptionExploitThreatHuntingThreatIntelligenceBusinessContinuityPlanBackdoorIdentity andAccessManagement(IAM)BankerTrojanSpoofingCybersecurityHackerScarewareDataIntegrityFirewallPhishingTwo-factorAuthentificationPIIIdentityBotnetKeyloggerCryptojackingProcessHollowingRootkitSecureSocketLayer(SSL)VPNDarkWebPatchRansomwareDataLossPrevention(DLP)GreylistPenTestingSocialEngineeringRisktoolIoTWhiteHat -Black HatDigitalTransformationAuthenticationThreatAssessmentDataBreachDDoSTwo-stepAuthentificationClientlessSIMSwappingZero-dayExploitMan-in-theMiddleAttackClickjackingSpearPhishingDigitalForensicsBYODSECaaSCAPTCHAWhitelist,AllowlistFastIdentityOnline(FIDO)VirusSpamVulnerabilityInsiderThreatHoneypotSpywareRemoteDesktopProtocol(RDP)Sandbox(ing)CriticalInfrastructureParentalControlsBYOLFilelessMalwareAdwareIndicators ofCompromise(IOC)BruteForceAttackDecryptionIn-lineNetworkDeviceWAFMalvertisingDrive ByDownloadAttackEncryptionExploitThreatHuntingThreatIntelligenceBusinessContinuityPlanBackdoorIdentity andAccessManagement(IAM)BankerTrojanSpoofingCybersecurityHackerScarewareDataIntegrityFirewallPhishingTwo-factorAuthentificationPIIIdentityBotnetKeyloggerCryptojackingProcessHollowingRootkitSecureSocketLayer(SSL)VPNDarkWebPatchRansomwareDataLossPrevention(DLP)GreylistPenTestingSocialEngineeringRisktoolIoTWhiteHat -Black HatDigitalTransformationAuthenticationThreatAssessmentDataBreachDDoSTwo-stepAuthentificationClientlessSIMSwappingZero-dayExploitMan-in-theMiddleAttackClickjackingSpearPhishingDigitalForensicsBYODSECaaSCAPTCHAWhitelist,AllowlistFastIdentityOnline(FIDO)VirusSpamVulnerabilityInsiderThreatHoneypotSpywareRemoteDesktopProtocol(RDP)Sandbox(ing)CriticalInfrastructureParentalControlsBYOLFilelessMalwareAdware

Cyber Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  1. Indicators of Compromise (IOC)
  2. Brute Force Attack
  3. Decryption
  4. In-line Network Device
  5. WAF
  6. Malvertising
  7. Drive By Download Attack
  8. Encryption
  9. Exploit
  10. Threat Hunting
  11. Threat Intelligence
  12. Business Continuity Plan
  13. Backdoor
  14. Identity and Access Management (IAM)
  15. Banker Trojan
  16. Spoofing
  17. Cybersecurity
  18. Hacker
  19. Scareware
  20. Data Integrity
  21. Firewall
  22. Phishing
  23. Two-factor Authentification
  24. PII
  25. Identity
  26. Botnet
  27. Keylogger
  28. Cryptojacking
  29. Process Hollowing
  30. Rootkit
  31. Secure Socket Layer (SSL)
  32. VPN
  33. Dark Web
  34. Patch
  35. Ransomware
  36. Data LossPrevention (DLP)
  37. Greylist
  38. Pen Testing
  39. Social Engineering
  40. Risktool
  41. IoT
  42. White Hat - Black Hat
  43. Digital Transformation
  44. Authentication
  45. Threat Assessment
  46. Data Breach
  47. DDoS
  48. Two-step Authentification
  49. Clientless
  50. SIM Swapping
  51. Zero-day Exploit
  52. Man-in-theMiddle Attack
  53. Clickjacking
  54. Spear Phishing
  55. Digital Forensics
  56. BYOD
  57. SECaaS
  58. CAPTCHA
  59. Whitelist, Allowlist
  60. Fast Identity Online (FIDO)
  61. Virus
  62. Spam
  63. Vulnerability
  64. Insider Threat
  65. Honeypot
  66. Spyware
  67. Remote Desktop Protocol (RDP)
  68. Sandbox(ing)
  69. Critical Infrastructure
  70. Parental Controls
  71. BYOL
  72. Fileless Malware
  73. Adware