Spoofing Spear Phishing Nework Exploit Drive By Download VPN MiTRE DLP RDP APT Encryption Scareware Safeguard Honeypot Inline Device MITM Ransomware SPAM Social Engineering Rootkit CSOC SIEM Greylist COOP Blocklist Authentication COTS Patching Forensics Botnet WAF CTI Decryption Cryptojacking Sandbox Keylogger Bruteforce SaaS Assessment Incident Backdoor Technology Insider Threat MFA IAM DNS Fileless Malware Hacker Trojan Vulnerability EDR Clickjacking CAPTCHA Antivirus Identity IDS Darkweb Sim Swapping DDOS Phishing Malware Zero Trust Security Breach PHI Firewall Blacklist IoT Cyber IPS Endpoint Threat Spyware Anti- Malware BIA Malvertising Adware SSL BYOD PII Whitelist 2FA Anti- Phishing Sniffing 0- Day IOC Risk Virus Attack Vector SOAR Spoofing Spear Phishing Nework Exploit Drive By Download VPN MiTRE DLP RDP APT Encryption Scareware Safeguard Honeypot Inline Device MITM Ransomware SPAM Social Engineering Rootkit CSOC SIEM Greylist COOP Blocklist Authentication COTS Patching Forensics Botnet WAF CTI Decryption Cryptojacking Sandbox Keylogger Bruteforce SaaS Assessment Incident Backdoor Technology Insider Threat MFA IAM DNS Fileless Malware Hacker Trojan Vulnerability EDR Clickjacking CAPTCHA Antivirus Identity IDS Darkweb Sim Swapping DDOS Phishing Malware Zero Trust Security Breach PHI Firewall Blacklist IoT Cyber IPS Endpoint Threat Spyware Anti- Malware BIA Malvertising Adware SSL BYOD PII Whitelist 2FA Anti- Phishing Sniffing 0- Day IOC Risk Virus Attack Vector SOAR
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spoofing
Spear Phishing
Nework
Exploit
Drive By Download
VPN
MiTRE
DLP
RDP
APT
Encryption
Scareware
Safeguard
Honeypot
Inline Device
MITM
Ransomware
SPAM
Social Engineering
Rootkit
CSOC
SIEM
Greylist
COOP
Blocklist
Authentication
COTS
Patching
Forensics
Botnet
WAF
CTI
Decryption
Cryptojacking
Sandbox
Keylogger
Bruteforce
SaaS
Assessment
Incident
Backdoor
Technology
Insider Threat
MFA
IAM
DNS
Fileless Malware
Hacker
Trojan
Vulnerability
EDR
Clickjacking
CAPTCHA
Antivirus
Identity
IDS
Darkweb
Sim Swapping
DDOS
Phishing
Malware
Zero Trust
Security
Breach
PHI
Firewall
Blacklist
IoT
Cyber
IPS
Endpoint
Threat
Spyware
Anti-Malware
BIA
Malvertising
Adware
SSL
BYOD
PII
Whitelist
2FA
Anti-Phishing
Sniffing
0-Day
IOC
Risk
Virus
Attack Vector
SOAR