VPN Firewall Inline Device Sim Swapping Breach Sandbox Anti- Malware Adware IOC Rootkit Social Engineering COOP Encryption Technology SaaS PII CTI SSL DLP Insider Threat Sniffing Keylogger Risk Hacker Cyber COTS Safeguard Greylist Antivirus Incident Exploit Virus Endpoint Threat WAF Authentication Security Assessment MFA Fileless Malware Spyware Drive By Download Blacklist Nework Vulnerability APT Clickjacking BYOD SIEM IAM Blocklist Forensics IDS Backdoor CSOC IoT DNS Spear Phishing Trojan Phishing Scareware 0- Day Bruteforce Ransomware 2FA SPAM DDOS Malware Identity EDR RDP Malvertising Zero Trust MiTRE MITM PHI Decryption Cryptojacking BIA Attack Vector Anti- Phishing Spoofing Botnet IPS Darkweb Honeypot Patching Whitelist CAPTCHA SOAR VPN Firewall Inline Device Sim Swapping Breach Sandbox Anti- Malware Adware IOC Rootkit Social Engineering COOP Encryption Technology SaaS PII CTI SSL DLP Insider Threat Sniffing Keylogger Risk Hacker Cyber COTS Safeguard Greylist Antivirus Incident Exploit Virus Endpoint Threat WAF Authentication Security Assessment MFA Fileless Malware Spyware Drive By Download Blacklist Nework Vulnerability APT Clickjacking BYOD SIEM IAM Blocklist Forensics IDS Backdoor CSOC IoT DNS Spear Phishing Trojan Phishing Scareware 0- Day Bruteforce Ransomware 2FA SPAM DDOS Malware Identity EDR RDP Malvertising Zero Trust MiTRE MITM PHI Decryption Cryptojacking BIA Attack Vector Anti- Phishing Spoofing Botnet IPS Darkweb Honeypot Patching Whitelist CAPTCHA SOAR
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
VPN
Firewall
Inline Device
Sim Swapping
Breach
Sandbox
Anti-Malware
Adware
IOC
Rootkit
Social Engineering
COOP
Encryption
Technology
SaaS
PII
CTI
SSL
DLP
Insider Threat
Sniffing
Keylogger
Risk
Hacker
Cyber
COTS
Safeguard
Greylist
Antivirus
Incident
Exploit
Virus
Endpoint
Threat
WAF
Authentication
Security
Assessment
MFA
Fileless Malware
Spyware
Drive By Download
Blacklist
Nework
Vulnerability
APT
Clickjacking
BYOD
SIEM
IAM
Blocklist
Forensics
IDS
Backdoor
CSOC
IoT
DNS
Spear Phishing
Trojan
Phishing
Scareware
0-Day
Bruteforce
Ransomware
2FA
SPAM
DDOS
Malware
Identity
EDR
RDP
Malvertising
Zero Trust
MiTRE
MITM
PHI
Decryption
Cryptojacking
BIA
Attack Vector
Anti-Phishing
Spoofing
Botnet
IPS
Darkweb
Honeypot
Patching
Whitelist
CAPTCHA
SOAR