Backdoor IT Security Program Incident response Hacker Security posture Virus Network monitoring VPN Denial of Service (DOS) MFA Man-in- the- middle attack Keylogger Password Cybersecurity insurance Patch Firewall Digital Certificate Phishing Cyber intelligence Data Privacy 2FA Cyberbullying Vulnerability Trojan Crowdstrike PII Identity theft Rootkit Exploit Security breach Encryption Spam Ransomware Zero- day exploit Penetration testing Cybersecurity awareness Backdoor IT Security Program Incident response Hacker Security posture Virus Network monitoring VPN Denial of Service (DOS) MFA Man-in- the- middle attack Keylogger Password Cybersecurity insurance Patch Firewall Digital Certificate Phishing Cyber intelligence Data Privacy 2FA Cyberbullying Vulnerability Trojan Crowdstrike PII Identity theft Rootkit Exploit Security breach Encryption Spam Ransomware Zero- day exploit Penetration testing Cybersecurity awareness
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Backdoor
IT Security Program
Incident response
Hacker
Security posture
Virus
Network monitoring
VPN
Denial of Service (DOS)
MFA
Man-in-the-middle attack
Keylogger
Password
Cybersecurity insurance
Patch
Firewall
Digital Certificate
Phishing
Cyber intelligence
Data Privacy
2FA
Cyberbullying
Vulnerability
Trojan
Crowdstrike
PII
Identity theft
Rootkit
Exploit
Security breach
Encryption
Spam
Ransomware
Zero-day exploit
Penetration testing
Cybersecurity awareness