SpoofingAn attacker takesadvantage of thefact that the userthinks the sitethey are visitingis legitimateSocialEngineeringRelies onmanipulating peopleinto violating securityprocedures anddivulging sensitive orpersonal informationBirthdayattackAn attackerabuses a securityfeature: hashalgorithms, whichare used to verifythe authenticity ofmessages.Man intheMiddleA hacker orcompromisedsystem sits inbetween twouncompromisedpeople or systemsSpearPhishingThreat actorsuse a deepknowledge ofthe potentialvictims to targetthemExploitsA software tooldesigned totake advantageof a flaw in acomputersystemBotnetA network ofinfected devicesthat can becontrolled by anattacker to performmalicious activitiesPasswordAttackThis type of attackis aimedspecifically atobtaining a user'spassword or anaccount'spassword.RogueDeviceThis type ofattack exists onthe network asan unmanageddeviceDDoSAttackInvolves the use ofnumerouscompromisedcomputer systemsor mobile devicesto target a serverDNSTunnelingUtilizes theDNS protocol tocommunicatenon-DNS trafficover port 53MalwareWide range ofsoftware programsdesigned toinfiltrate, damage,or gainunauthorizedaccessInsiderThreatCaused by theactions ofemployees, formeremployees,businesscontractors, orassociatesIOTExploit vulnerabilitiesin internet-connecteddevices, such assmart POS, Lighting,and Securitysystems, to launchdenial-of-serviceattacksAccounthijackingThe attackertakes over asessionbetween aclient and theserver.CredentialExploitationSingle factorauthenticationleaves the doorwide open toattackers planningon performingprivilege escalation.WhalingA type of phishingattack that alsoleverages personalcommunication togain access to auser's device orpersonal informationKeyloggerA type of malicioussoftware designedto track everykeystroke andreport it back to ahacker.BruteForceAttempting variouscombinations toguess passwords,credentials, andencryption keysXSSattacksCross-site scripting,the attackertransmits maliciousscripts usingclickable contentthat gets sent to thetarget's browserSQLInjectionOccurs whenan attackerinsertsmalicious codeinto a serverthat uses SQLAdwareA type of malwarethat displaysunwanted ads onend-user devicesto generaterevenue fromadvertisers.AccountCompromisea socialengineeringtactic where theattacker posesas a trustworthyexecutiveRansomwaresystem is heldhostage untilthey agree topay a ransomto the attacker.SpoofingAn attacker takesadvantage of thefact that the userthinks the sitethey are visitingis legitimateSocialEngineeringRelies onmanipulating peopleinto violating securityprocedures anddivulging sensitive orpersonal informationBirthdayattackAn attackerabuses a securityfeature: hashalgorithms, whichare used to verifythe authenticity ofmessages.Man intheMiddleA hacker orcompromisedsystem sits inbetween twouncompromisedpeople or systemsSpearPhishingThreat actorsuse a deepknowledge ofthe potentialvictims to targetthemExploitsA software tooldesigned totake advantageof a flaw in acomputersystemBotnetA network ofinfected devicesthat can becontrolled by anattacker to performmalicious activitiesPasswordAttackThis type of attackis aimedspecifically atobtaining a user'spassword or anaccount'spassword.RogueDeviceThis type ofattack exists onthe network asan unmanageddeviceDDoSAttackInvolves the use ofnumerouscompromisedcomputer systemsor mobile devicesto target a serverDNSTunnelingUtilizes theDNS protocol tocommunicatenon-DNS trafficover port 53MalwareWide range ofsoftware programsdesigned toinfiltrate, damage,or gainunauthorizedaccessInsiderThreatCaused by theactions ofemployees, formeremployees,businesscontractors, orassociatesIOTExploit vulnerabilitiesin internet-connecteddevices, such assmart POS, Lighting,and Securitysystems, to launchdenial-of-serviceattacksAccounthijackingThe attackertakes over asessionbetween aclient and theserver.CredentialExploitationSingle factorauthenticationleaves the doorwide open toattackers planningon performingprivilege escalation.WhalingA type of phishingattack that alsoleverages personalcommunication togain access to auser's device orpersonal informationKeyloggerA type of malicioussoftware designedto track everykeystroke andreport it back to ahacker.BruteForceAttempting variouscombinations toguess passwords,credentials, andencryption keysXSSattacksCross-site scripting,the attackertransmits maliciousscripts usingclickable contentthat gets sent to thetarget's browserSQLInjectionOccurs whenan attackerinsertsmalicious codeinto a serverthat uses SQLAdwareA type of malwarethat displaysunwanted ads onend-user devicesto generaterevenue fromadvertisers.AccountCompromisea socialengineeringtactic where theattacker posesas a trustworthyexecutiveRansomwaresystem is heldhostage untilthey agree topay a ransomto the attacker.

Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. An attacker takes advantage of the fact that the user thinks the site they are visiting is legitimate
    Spoofing
  2. Relies on manipulating people into violating security procedures and divulging sensitive or personal information
    Social Engineering
  3. An attacker abuses a security feature: hash algorithms, which are used to verify the authenticity of messages.
    Birthday attack
  4. A hacker or compromised system sits in between two uncompromised people or systems
    Man in the Middle
  5. Threat actors use a deep knowledge of the potential victims to target them
    Spear Phishing
  6. A software tool designed to take advantage of a flaw in a computer system
    Exploits
  7. A network of infected devices that can be controlled by an attacker to perform malicious activities
    Botnet
  8. This type of attack is aimed specifically at obtaining a user's password or an account's password.
    Password Attack
  9. This type of attack exists on the network as an unmanaged device
    Rogue Device
  10. Involves the use of numerous compromised computer systems or mobile devices to target a server
    DDoS Attack
  11. Utilizes the DNS protocol to communicate non-DNS traffic over port 53
    DNS Tunneling
  12. Wide range of software programs designed to infiltrate, damage, or gain unauthorized access
    Malware
  13. Caused by the actions of employees, former employees, business contractors, or associates
    Insider Threat
  14. Exploit vulnerabilities in internet-connected devices, such as smart POS, Lighting, and Security systems, to launch denial-of-service attacks
    IOT
  15. The attacker takes over a session between a client and the server.
    Account hijacking
  16. Single factor authentication leaves the door wide open to attackers planning on performing privilege escalation.
    Credential Exploitation
  17. A type of phishing attack that also leverages personal communication to gain access to a user's device or personal information
    Whaling
  18. A type of malicious software designed to track every keystroke and report it back to a hacker.
    Keylogger
  19. Attempting various combinations to guess passwords, credentials, and encryption keys
    Brute Force
  20. Cross-site scripting, the attacker transmits malicious scripts using clickable content that gets sent to the target's browser
    XSS attacks
  21. Occurs when an attacker inserts malicious code into a server that uses SQL
    SQL Injection
  22. A type of malware that displays unwanted ads on end-user devices to generate revenue from advertisers.
    Adware
  23. a social engineering tactic where the attacker poses as a trustworthy executive
    Account Compromise
  24. system is held hostage until they agree to pay a ransom to the attacker.
    Ransomware