Indicators of Compromise (IOC) Brute Force Attack Decryption In-line Network Device WAF Malvertising Drive By Download Attack Encryption Exploit Threat Hunting Threat Intelligence Business Continuity Plan Backdoor Identity and Access Management (IAM) Banker Trojan Spoofing Cybersecurity Hacker Scareware Data Integrity Firewall Phishing Two-factor Authentification PII Identity Botnet Keylogger Cryptojacking Process Hollowing Rootkit Secure Socket Layer (SSL) VPN Dark Web Patch Ransomware Data LossPrevention (DLP) Greylist Pen Testing Social Engineering Risktool IoT White Hat - Black Hat Digital Transformation Authentication Threat Assessment Data Breach DDoS Two-step Authentification Clientless SIM Swapping Zero- day Exploit Man-in- theMiddle Attack Clickjacking Spear Phishing Digital Forensics BYOD SECaaS CAPTCHA Whitelist, Allowlist Fast Identity Online (FIDO) Virus Spam Vulnerability Insider Threat Honeypot Spyware Remote Desktop Protocol (RDP) Sandbox(ing) Critical Infrastructure Parental Controls BYOL Fileless Malware Adware Indicators of Compromise (IOC) Brute Force Attack Decryption In-line Network Device WAF Malvertising Drive By Download Attack Encryption Exploit Threat Hunting Threat Intelligence Business Continuity Plan Backdoor Identity and Access Management (IAM) Banker Trojan Spoofing Cybersecurity Hacker Scareware Data Integrity Firewall Phishing Two-factor Authentification PII Identity Botnet Keylogger Cryptojacking Process Hollowing Rootkit Secure Socket Layer (SSL) VPN Dark Web Patch Ransomware Data LossPrevention (DLP) Greylist Pen Testing Social Engineering Risktool IoT White Hat - Black Hat Digital Transformation Authentication Threat Assessment Data Breach DDoS Two-step Authentification Clientless SIM Swapping Zero- day Exploit Man-in- theMiddle Attack Clickjacking Spear Phishing Digital Forensics BYOD SECaaS CAPTCHA Whitelist, Allowlist Fast Identity Online (FIDO) Virus Spam Vulnerability Insider Threat Honeypot Spyware Remote Desktop Protocol (RDP) Sandbox(ing) Critical Infrastructure Parental Controls BYOL Fileless Malware Adware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Indicators of Compromise (IOC)
Brute Force Attack
Decryption
In-line Network Device
WAF
Malvertising
Drive By Download Attack
Encryption
Exploit
Threat Hunting
Threat Intelligence
Business Continuity Plan
Backdoor
Identity and Access Management (IAM)
Banker Trojan
Spoofing
Cybersecurity
Hacker
Scareware
Data Integrity
Firewall
Phishing
Two-factor Authentification
PII
Identity
Botnet
Keylogger
Cryptojacking
Process Hollowing
Rootkit
Secure Socket Layer (SSL)
VPN
Dark Web
Patch
Ransomware
Data LossPrevention (DLP)
Greylist
Pen Testing
Social Engineering
Risktool
IoT
White Hat - Black Hat
Digital Transformation
Authentication
Threat Assessment
Data Breach
DDoS
Two-step Authentification
Clientless
SIM Swapping
Zero-day Exploit
Man-in-theMiddle Attack
Clickjacking
Spear Phishing
Digital Forensics
BYOD
SECaaS
CAPTCHA
Whitelist, Allowlist
Fast Identity Online (FIDO)
Virus
Spam
Vulnerability
Insider Threat
Honeypot
Spyware
Remote Desktop Protocol (RDP)
Sandbox(ing)
Critical Infrastructure
Parental Controls
BYOL
Fileless Malware
Adware