(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
A software tool designed to take advantage of a flaw in a computer system
Exploits
Caused by the actions of employees, former employees, business contractors, or associates
Insider Threat
Involves the use of numerous compromised computer systems or mobile devices to target a server
DDoS Attack
An attacker takes advantage of the fact that the user thinks the site they are visiting is legitimate
Spoofing
system is held hostage until they agree to pay a ransom to the attacker.
Ransomware
Threat actors use a deep knowledge of the potential victims to target them
Spear Phishing
A type of phishing attack that also leverages personal communication to gain access to a user's device or personal information
Whaling
A hacker or compromised system sits in between two uncompromised people or systems
Man in the Middle
This type of attack is aimed specifically at obtaining a user's password or an account's password.
Password Attack
A type of malware that displays unwanted ads on end-user devices to generate revenue from advertisers.
Adware
Cross-site scripting, the attacker transmits malicious scripts using clickable content that gets sent to the target's browser
XSS attacks
Utilizes the DNS protocol to communicate non-DNS traffic over port 53
DNS Tunneling
Single factor authentication leaves the door wide open to attackers planning on performing privilege escalation.
Credential Exploitation
A type of malicious software designed to track every keystroke and report it back to a hacker.
Keylogger
Exploit vulnerabilities in internet-connected devices, such as smart POS, Lighting, and Security systems, to launch denial-of-service attacks
IOT
Occurs when an attacker inserts malicious code into a server that uses SQL
SQL Injection
The attacker takes over a session between a client and the server.
Account hijacking
A network of infected devices that can be controlled by an attacker to perform malicious activities
Botnet
This type of attack exists on the network as an unmanaged device
Rogue Device
Attempting various combinations to guess passwords, credentials, and encryption keys
Brute Force
An attacker abuses a security feature: hash algorithms, which are used to verify the authenticity of messages.
Birthday attack
Relies on manipulating people into violating security procedures and divulging sensitive or personal information
Social Engineering
a social engineering tactic where the attacker poses as a trustworthy executive
Account Compromise
Wide range of software programs designed to infiltrate, damage, or gain unauthorized access
Malware