VPN ransomware Cyber Defense integrity escalation WISP OS Cyber Security cryptography firewall cyber attack malware HIPAA business continuity SyssecAdmin IoT incident response pentest phishing vishing Defense- in-depth risk assessment virus admin hacker botnet bug network vulnerability breach DDoS APT antivirus confidentiality spam encryption PII CIA triad spoofing Dark Web BEC PHI identity theft passphrase resilience insider threat FTP rootkit zero- day compliance smishing worm packet MFA Security Operations social engineering availability EDR training risk security awareness exploit IP spyware incident password IOC security policy IDS IPS defense evasion VPN ransomware Cyber Defense integrity escalation WISP OS Cyber Security cryptography firewall cyber attack malware HIPAA business continuity SyssecAdmin IoT incident response pentest phishing vishing Defense- in-depth risk assessment virus admin hacker botnet bug network vulnerability breach DDoS APT antivirus confidentiality spam encryption PII CIA triad spoofing Dark Web BEC PHI identity theft passphrase resilience insider threat FTP rootkit zero- day compliance smishing worm packet MFA Security Operations social engineering availability EDR training risk security awareness exploit IP spyware incident password IOC security policy IDS IPS defense evasion
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
VPN
ransomware
Cyber Defense
integrity
escalation
WISP
OS
Cyber Security
cryptography
firewall
cyber attack
malware
HIPAA
business continuity
SyssecAdmin
IoT
incident response
pentest
phishing
vishing
Defense-in-depth
risk assessment
virus
admin
hacker
botnet
bug
network
vulnerability
breach
DDoS
APT
antivirus
confidentiality
spam
encryption
PII
CIA triad
spoofing
Dark Web
BEC
PHI
identity theft
passphrase
resilience
insider threat
FTP
rootkit
zero-day
compliance
smishing
worm
packet
MFA
Security Operations
social engineering
availability
EDR
training
risk
security awareness
exploit
IP
spyware
incident
password
IOC
security policy
IDS
IPS
defense evasion