Decryption Fast Identity Online (FIDO) Secure Socket Layer (SSL) Patch Spoofing SIM Swapping Spam Data LossPrevention (DLP) Threat Intelligence Business Continuity Plan Insider Threat Keylogger Man-in- theMiddle Attack Authentication Sandbox(ing) Two-step Authentification Threat Assessment Drive By Download Attack Data Breach IoT In-line Network Device CAPTCHA BYOD Process Hollowing Critical Infrastructure Remote Desktop Protocol (RDP) BYOL Adware Ransomware Backdoor Spyware Spear Phishing VPN Cryptojacking Vulnerability Botnet Malvertising Risktool PII Virus Zero- day Exploit Whitelist, Allowlist Pen Testing Parental Controls Threat Hunting Greylist White Hat - Black Hat Dark Web SECaaS Clientless Two-factor Authentification Encryption Banker Trojan Honeypot DDoS Brute Force Attack Indicators of Compromise (IOC) Exploit Phishing Digital Transformation WAF Identity and Access Management (IAM) Fileless Malware Identity Rootkit Hacker Data Integrity Scareware Social Engineering Digital Forensics Cybersecurity Firewall Clickjacking Decryption Fast Identity Online (FIDO) Secure Socket Layer (SSL) Patch Spoofing SIM Swapping Spam Data LossPrevention (DLP) Threat Intelligence Business Continuity Plan Insider Threat Keylogger Man-in- theMiddle Attack Authentication Sandbox(ing) Two-step Authentification Threat Assessment Drive By Download Attack Data Breach IoT In-line Network Device CAPTCHA BYOD Process Hollowing Critical Infrastructure Remote Desktop Protocol (RDP) BYOL Adware Ransomware Backdoor Spyware Spear Phishing VPN Cryptojacking Vulnerability Botnet Malvertising Risktool PII Virus Zero- day Exploit Whitelist, Allowlist Pen Testing Parental Controls Threat Hunting Greylist White Hat - Black Hat Dark Web SECaaS Clientless Two-factor Authentification Encryption Banker Trojan Honeypot DDoS Brute Force Attack Indicators of Compromise (IOC) Exploit Phishing Digital Transformation WAF Identity and Access Management (IAM) Fileless Malware Identity Rootkit Hacker Data Integrity Scareware Social Engineering Digital Forensics Cybersecurity Firewall Clickjacking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Decryption
Fast Identity Online (FIDO)
Secure Socket Layer (SSL)
Patch
Spoofing
SIM Swapping
Spam
Data LossPrevention (DLP)
Threat Intelligence
Business Continuity Plan
Insider Threat
Keylogger
Man-in-theMiddle Attack
Authentication
Sandbox(ing)
Two-step Authentification
Threat Assessment
Drive By Download Attack
Data Breach
IoT
In-line Network Device
CAPTCHA
BYOD
Process Hollowing
Critical Infrastructure
Remote Desktop Protocol (RDP)
BYOL
Adware
Ransomware
Backdoor
Spyware
Spear Phishing
VPN
Cryptojacking
Vulnerability
Botnet
Malvertising
Risktool
PII
Virus
Zero-day Exploit
Whitelist, Allowlist
Pen Testing
Parental Controls
Threat Hunting
Greylist
White Hat - Black Hat
Dark Web
SECaaS
Clientless
Two-factor Authentification
Encryption
Banker Trojan
Honeypot
DDoS
Brute Force Attack
Indicators of Compromise (IOC)
Exploit
Phishing
Digital Transformation
WAF
Identity and Access Management (IAM)
Fileless Malware
Identity
Rootkit
Hacker
Data Integrity
Scareware
Social Engineering
Digital Forensics
Cybersecurity
Firewall
Clickjacking