(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
A security process in which users provide two different authentication factors.
Two Factor Authentication
The process of converting data into a code to prevent unauthorized access.
Encryption
ndividual with malicious intent who engages in unauthorized computer or network activities, often with the goal of causing harm, stealing sensitive information, or profiting illegally.
Black Hat Hacker
The process of verifying the identity of a user or system.
Authentication
A set of rules and guidelines for maintaining security within an organization.
Security Policy
Security measures taken to protect individual devices such as computers and phones.
Endpoint Security
The practice of securing computer networks and their infrastructure.
Network Security
Creating copies of data to ensure it can be restored in case of data loss.
Backup
A system that restricts and manages access to certain resources or areas.
Access Control
The evaluation of potential risks and vulnerabilities in a system.
Risk Assessment
Ransomware: Malicious software that encrypts files and demands a ransom for their release.
Ransomware
The process of regularly updating software to fix vulnerabilities and enhance security.
Patch Management
A security system that monitors and filters incoming and outgoing network traffic.
Firewall
A secure and encrypted connection between a user's computer and a remote server.
VPN
Authorized testing and probing of computer systems for security vulnerabilities.
Ethical Hacking
Manipulating individuals to disclose sensitive information or perform actions.
Social Engineering
Software designed to detect, prevent, and remove malicious software from a computer.
Antivirus
Software designed to harm or exploit computer systems and data.
Malware
A system that identifies and responds to unauthorized access to a network.
Intrusion Detection System
The practice of protecting systems, networks, and data from digital attacks.
Cybersecurity
A plan for addressing and mitigating cybersecurity incidents.
Incident Response
A method of attempting to acquire sensitive information through deceptive emails.
Phishing
A security system that protects web applications from various online threats.
Web Application Firewall
Unauthorized access or exposure of sensitive data, often resulting in harm
Data Breach