Parental Controls VPN Banker Trojan Spear Phishing Data Integrity PII Brute Force Attack SIM Swapping Threat Assessment Zero- day Exploit DDoS Spoofing Insider Threat Two-step Authentification Two-factor Authentification Ransomware Business Continuity Plan Clickjacking Whitelist, Allowlist Secure Socket Layer (SSL) Fast Identity Online (FIDO) Spyware Social Engineering BYOD Cryptojacking Hacker Threat Intelligence SECaaS Digital Forensics Sandbox(ing) Critical Infrastructure White Hat - Black Hat Keylogger Scareware Malvertising IoT Spam Exploit Process Hollowing Honeypot Risktool Identity Dark Web Virus Greylist In-line Network Device Rootkit Drive By Download Attack Patch Man-in- theMiddle Attack Pen Testing Digital Transformation Encryption Firewall Data Breach Threat Hunting WAF Identity and Access Management (IAM) Adware Fileless Malware Vulnerability Cybersecurity Indicators of Compromise (IOC) Remote Desktop Protocol (RDP) Phishing Data LossPrevention (DLP) Decryption Botnet Backdoor Authentication BYOL CAPTCHA Clientless Parental Controls VPN Banker Trojan Spear Phishing Data Integrity PII Brute Force Attack SIM Swapping Threat Assessment Zero- day Exploit DDoS Spoofing Insider Threat Two-step Authentification Two-factor Authentification Ransomware Business Continuity Plan Clickjacking Whitelist, Allowlist Secure Socket Layer (SSL) Fast Identity Online (FIDO) Spyware Social Engineering BYOD Cryptojacking Hacker Threat Intelligence SECaaS Digital Forensics Sandbox(ing) Critical Infrastructure White Hat - Black Hat Keylogger Scareware Malvertising IoT Spam Exploit Process Hollowing Honeypot Risktool Identity Dark Web Virus Greylist In-line Network Device Rootkit Drive By Download Attack Patch Man-in- theMiddle Attack Pen Testing Digital Transformation Encryption Firewall Data Breach Threat Hunting WAF Identity and Access Management (IAM) Adware Fileless Malware Vulnerability Cybersecurity Indicators of Compromise (IOC) Remote Desktop Protocol (RDP) Phishing Data LossPrevention (DLP) Decryption Botnet Backdoor Authentication BYOL CAPTCHA Clientless
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Parental Controls
VPN
Banker Trojan
Spear Phishing
Data Integrity
PII
Brute Force Attack
SIM Swapping
Threat Assessment
Zero-day Exploit
DDoS
Spoofing
Insider Threat
Two-step Authentification
Two-factor Authentification
Ransomware
Business Continuity Plan
Clickjacking
Whitelist, Allowlist
Secure Socket Layer (SSL)
Fast Identity Online (FIDO)
Spyware
Social Engineering
BYOD
Cryptojacking
Hacker
Threat Intelligence
SECaaS
Digital Forensics
Sandbox(ing)
Critical Infrastructure
White Hat - Black Hat
Keylogger
Scareware
Malvertising
IoT
Spam
Exploit
Process Hollowing
Honeypot
Risktool
Identity
Dark Web
Virus
Greylist
In-line Network Device
Rootkit
Drive By Download Attack
Patch
Man-in-theMiddle Attack
Pen Testing
Digital Transformation
Encryption
Firewall
Data Breach
Threat Hunting
WAF
Identity and Access Management (IAM)
Adware
Fileless Malware
Vulnerability
Cybersecurity
Indicators of Compromise (IOC)
Remote Desktop Protocol (RDP)
Phishing
Data LossPrevention (DLP)
Decryption
Botnet
Backdoor
Authentication
BYOL
CAPTCHA
Clientless