Spear Phishing SECaaS Firewall Cryptojacking Fast Identity Online (FIDO) Digital Transformation Phishing Adware Fileless Malware White Hat - Black Hat Digital Forensics Backdoor Ransomware Malvertising PII Parental Controls Risktool Man-in- theMiddle Attack Data LossPrevention (DLP) Encryption Social Engineering Business Continuity Plan Clientless Brute Force Attack Two-step Authentification Process Hollowing Dark Web Threat Assessment DDoS BYOD Sandbox(ing) Spoofing Two-factor Authentification Banker Trojan Insider Threat Scareware Threat Intelligence In-line Network Device Spam Vulnerability Critical Infrastructure Honeypot Identity and Access Management (IAM) Keylogger Threat Hunting Remote Desktop Protocol (RDP) Secure Socket Layer (SSL) Authentication Clickjacking CAPTCHA Cybersecurity Botnet Indicators of Compromise (IOC) Spyware Exploit Zero- day Exploit Rootkit Greylist Whitelist, Allowlist Decryption SIM Swapping Virus Hacker WAF IoT Identity Data Integrity Data Breach VPN Drive By Download Attack BYOL Patch Pen Testing Spear Phishing SECaaS Firewall Cryptojacking Fast Identity Online (FIDO) Digital Transformation Phishing Adware Fileless Malware White Hat - Black Hat Digital Forensics Backdoor Ransomware Malvertising PII Parental Controls Risktool Man-in- theMiddle Attack Data LossPrevention (DLP) Encryption Social Engineering Business Continuity Plan Clientless Brute Force Attack Two-step Authentification Process Hollowing Dark Web Threat Assessment DDoS BYOD Sandbox(ing) Spoofing Two-factor Authentification Banker Trojan Insider Threat Scareware Threat Intelligence In-line Network Device Spam Vulnerability Critical Infrastructure Honeypot Identity and Access Management (IAM) Keylogger Threat Hunting Remote Desktop Protocol (RDP) Secure Socket Layer (SSL) Authentication Clickjacking CAPTCHA Cybersecurity Botnet Indicators of Compromise (IOC) Spyware Exploit Zero- day Exploit Rootkit Greylist Whitelist, Allowlist Decryption SIM Swapping Virus Hacker WAF IoT Identity Data Integrity Data Breach VPN Drive By Download Attack BYOL Patch Pen Testing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spear Phishing
SECaaS
Firewall
Cryptojacking
Fast Identity Online (FIDO)
Digital Transformation
Phishing
Adware
Fileless Malware
White Hat - Black Hat
Digital Forensics
Backdoor
Ransomware
Malvertising
PII
Parental Controls
Risktool
Man-in-theMiddle Attack
Data LossPrevention (DLP)
Encryption
Social Engineering
Business Continuity Plan
Clientless
Brute Force Attack
Two-step Authentification
Process Hollowing
Dark Web
Threat Assessment
DDoS
BYOD
Sandbox(ing)
Spoofing
Two-factor Authentification
Banker Trojan
Insider Threat
Scareware
Threat Intelligence
In-line Network Device
Spam
Vulnerability
Critical Infrastructure
Honeypot
Identity and Access Management (IAM)
Keylogger
Threat Hunting
Remote Desktop Protocol (RDP)
Secure Socket Layer (SSL)
Authentication
Clickjacking
CAPTCHA
Cybersecurity
Botnet
Indicators of Compromise (IOC)
Spyware
Exploit
Zero-day Exploit
Rootkit
Greylist
Whitelist, Allowlist
Decryption
SIM Swapping
Virus
Hacker
WAF
IoT
Identity
Data Integrity
Data Breach
VPN
Drive By Download Attack
BYOL
Patch
Pen Testing