IoT Hacker Patch Drive By Download Attack Man-in- theMiddle Attack CAPTCHA Cryptojacking Fast Identity Online (FIDO) BYOL Vulnerability Cybersecurity Data Breach Decryption Authentication Clientless Fileless Malware Virus Honeypot Greylist Encryption Phishing Scareware Digital Transformation Social Engineering Zero- day Exploit WAF Brute Force Attack Risktool Data Integrity Malvertising Digital Forensics Critical Infrastructure Botnet VPN Spear Phishing SECaaS Exploit Two-step Authentification Secure Socket Layer (SSL) Spyware Business Continuity Plan Data LossPrevention (DLP) Identity In-line Network Device Adware Clickjacking Banker Trojan Rootkit Whitelist, Allowlist BYOD DDoS Backdoor Remote Desktop Protocol (RDP) Firewall Threat Hunting Indicators of Compromise (IOC) Dark Web Spam Sandbox(ing) Two-factor Authentification Insider Threat Spoofing Parental Controls Ransomware White Hat - Black Hat SIM Swapping Process Hollowing Threat Assessment Threat Intelligence PII Identity and Access Management (IAM) Pen Testing Keylogger IoT Hacker Patch Drive By Download Attack Man-in- theMiddle Attack CAPTCHA Cryptojacking Fast Identity Online (FIDO) BYOL Vulnerability Cybersecurity Data Breach Decryption Authentication Clientless Fileless Malware Virus Honeypot Greylist Encryption Phishing Scareware Digital Transformation Social Engineering Zero- day Exploit WAF Brute Force Attack Risktool Data Integrity Malvertising Digital Forensics Critical Infrastructure Botnet VPN Spear Phishing SECaaS Exploit Two-step Authentification Secure Socket Layer (SSL) Spyware Business Continuity Plan Data LossPrevention (DLP) Identity In-line Network Device Adware Clickjacking Banker Trojan Rootkit Whitelist, Allowlist BYOD DDoS Backdoor Remote Desktop Protocol (RDP) Firewall Threat Hunting Indicators of Compromise (IOC) Dark Web Spam Sandbox(ing) Two-factor Authentification Insider Threat Spoofing Parental Controls Ransomware White Hat - Black Hat SIM Swapping Process Hollowing Threat Assessment Threat Intelligence PII Identity and Access Management (IAM) Pen Testing Keylogger
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IoT
Hacker
Patch
Drive By Download Attack
Man-in-theMiddle Attack
CAPTCHA
Cryptojacking
Fast Identity Online (FIDO)
BYOL
Vulnerability
Cybersecurity
Data Breach
Decryption
Authentication
Clientless
Fileless Malware
Virus
Honeypot
Greylist
Encryption
Phishing
Scareware
Digital Transformation
Social Engineering
Zero-day Exploit
WAF
Brute Force Attack
Risktool
Data Integrity
Malvertising
Digital Forensics
Critical Infrastructure
Botnet
VPN
Spear Phishing
SECaaS
Exploit
Two-step Authentification
Secure Socket Layer (SSL)
Spyware
Business Continuity Plan
Data LossPrevention (DLP)
Identity
In-line Network Device
Adware
Clickjacking
Banker Trojan
Rootkit
Whitelist, Allowlist
BYOD
DDoS
Backdoor
Remote Desktop Protocol (RDP)
Firewall
Threat Hunting
Indicators of Compromise (IOC)
Dark Web
Spam
Sandbox(ing)
Two-factor Authentification
Insider Threat
Spoofing
Parental Controls
Ransomware
White Hat - Black Hat
SIM Swapping
Process Hollowing
Threat Assessment
Threat Intelligence
PII
Identity and Access Management (IAM)
Pen Testing
Keylogger