Two FactorAuthenticationA securityprocess in whichusers providetwo differentauthenticationfactors.SecurityPolicyA set of rulesand guidelinesfor maintainingsecurity withinanorganization.BackupCreating copiesof data toensure it canbe restored incase of dataloss.FirewallA securitysystem thatmonitors andfilters incomingand outgoingnetwork traffic.AuthenticationThe processof verifyingthe identityof a user orsystem.DataBreachUnauthorizedaccess orexposure ofsensitive data,often resultingin harmNetworkSecurityThe practice ofsecuringcomputernetworks andtheirinfrastructure.VPNA secure andencryptedconnectionbetween a user'scomputer and aremote server.SocialEngineeringManipulatingindividuals todisclosesensitiveinformation orperform actions.RansomwareRansomware:Malicious softwarethat encrypts filesand demands aransom for theirrelease.EndpointSecuritySecurity measurestaken to protectindividual devicessuch as computersand phones. EncryptionThe process ofconverting datainto a code topreventunauthorizedaccess.CybersecurityThe practice ofprotectingsystems,networks, anddata fromdigital attacks.AccessControlA system thatrestricts andmanages accessto certainresources orareas.IntrusionDetectionSystemA system thatidentifies andresponds tounauthorizedaccess to anetwork.MalwareSoftwaredesigned toharm or exploitcomputersystems anddata.PhishingA method ofattempting toacquire sensitiveinformationthroughdeceptive emails.AntivirusSoftware designedto detect, prevent,and removemalicious softwarefrom a computer.IncidentResponseA plan foraddressingand mitigatingcybersecurityincidents.WebApplicationFirewallA securitysystem thatprotects webapplicationsfrom variousonline threats.EthicalHackingAuthorized testingand probing ofcomputer systemsfor securityvulnerabilities.RiskAssessmentThe evaluationof potentialrisks andvulnerabilitiesin a system.BlackHatHackerndividual withmalicious intent whoengages inunauthorized computeror network activities,often with the goal ofcausing harm, stealingsensitive information,or profiting illegally.PatchManagementThe process ofregularly updatingsoftware to fixvulnerabilities andenhance security.Two FactorAuthenticationA securityprocess in whichusers providetwo differentauthenticationfactors.SecurityPolicyA set of rulesand guidelinesfor maintainingsecurity withinanorganization.BackupCreating copiesof data toensure it canbe restored incase of dataloss.FirewallA securitysystem thatmonitors andfilters incomingand outgoingnetwork traffic.AuthenticationThe processof verifyingthe identityof a user orsystem.DataBreachUnauthorizedaccess orexposure ofsensitive data,often resultingin harmNetworkSecurityThe practice ofsecuringcomputernetworks andtheirinfrastructure.VPNA secure andencryptedconnectionbetween a user'scomputer and aremote server.SocialEngineeringManipulatingindividuals todisclosesensitiveinformation orperform actions.RansomwareRansomware:Malicious softwarethat encrypts filesand demands aransom for theirrelease.EndpointSecuritySecurity measurestaken to protectindividual devicessuch as computersand phones. EncryptionThe process ofconverting datainto a code topreventunauthorizedaccess.CybersecurityThe practice ofprotectingsystems,networks, anddata fromdigital attacks.AccessControlA system thatrestricts andmanages accessto certainresources orareas.IntrusionDetectionSystemA system thatidentifies andresponds tounauthorizedaccess to anetwork.MalwareSoftwaredesigned toharm or exploitcomputersystems anddata.PhishingA method ofattempting toacquire sensitiveinformationthroughdeceptive emails.AntivirusSoftware designedto detect, prevent,and removemalicious softwarefrom a computer.IncidentResponseA plan foraddressingand mitigatingcybersecurityincidents.WebApplicationFirewallA securitysystem thatprotects webapplicationsfrom variousonline threats.EthicalHackingAuthorized testingand probing ofcomputer systemsfor securityvulnerabilities.RiskAssessmentThe evaluationof potentialrisks andvulnerabilitiesin a system.BlackHatHackerndividual withmalicious intent whoengages inunauthorized computeror network activities,often with the goal ofcausing harm, stealingsensitive information,or profiting illegally.PatchManagementThe process ofregularly updatingsoftware to fixvulnerabilities andenhance security.

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. A security process in which users provide two different authentication factors.
    Two Factor Authentication
  2. A set of rules and guidelines for maintaining security within an organization.
    Security Policy
  3. Creating copies of data to ensure it can be restored in case of data loss.
    Backup
  4. A security system that monitors and filters incoming and outgoing network traffic.
    Firewall
  5. The process of verifying the identity of a user or system.
    Authentication
  6. Unauthorized access or exposure of sensitive data, often resulting in harm
    Data Breach
  7. The practice of securing computer networks and their infrastructure.
    Network Security
  8. A secure and encrypted connection between a user's computer and a remote server.
    VPN
  9. Manipulating individuals to disclose sensitive information or perform actions.
    Social Engineering
  10. Ransomware: Malicious software that encrypts files and demands a ransom for their release.
    Ransomware
  11. Security measures taken to protect individual devices such as computers and phones.
    Endpoint Security
  12. The process of converting data into a code to prevent unauthorized access.
    Encryption
  13. The practice of protecting systems, networks, and data from digital attacks.
    Cybersecurity
  14. A system that restricts and manages access to certain resources or areas.
    Access Control
  15. A system that identifies and responds to unauthorized access to a network.
    Intrusion Detection System
  16. Software designed to harm or exploit computer systems and data.
    Malware
  17. A method of attempting to acquire sensitive information through deceptive emails.
    Phishing
  18. Software designed to detect, prevent, and remove malicious software from a computer.
    Antivirus
  19. A plan for addressing and mitigating cybersecurity incidents.
    Incident Response
  20. A security system that protects web applications from various online threats.
    Web Application Firewall
  21. Authorized testing and probing of computer systems for security vulnerabilities.
    Ethical Hacking
  22. The evaluation of potential risks and vulnerabilities in a system.
    Risk Assessment
  23. ndividual with malicious intent who engages in unauthorized computer or network activities, often with the goal of causing harm, stealing sensitive information, or profiting illegally.
    Black Hat Hacker
  24. The process of regularly updating software to fix vulnerabilities and enhance security.
    Patch Management