virus integrity EDR MFA CIA triad antivirus rootkit firewall resilience PII vulnerability Cyber Defense risk assessment social engineering DDoS vishing security policy IP bug confidentiality phishing spyware malware password ransomware HIPAA spoofing encryption FTP SyssecAdmin Dark Web defense evasion availability risk breach worm security awareness spam passphrase smishing IOC incident response packet OS cryptography APT Defense- in-depth network Security Operations admin cyber attack PHI IoT training zero- day botnet pentest insider threat VPN compliance BEC escalation hacker IPS Cyber Security incident exploit business continuity WISP identity theft IDS virus integrity EDR MFA CIA triad antivirus rootkit firewall resilience PII vulnerability Cyber Defense risk assessment social engineering DDoS vishing security policy IP bug confidentiality phishing spyware malware password ransomware HIPAA spoofing encryption FTP SyssecAdmin Dark Web defense evasion availability risk breach worm security awareness spam passphrase smishing IOC incident response packet OS cryptography APT Defense- in-depth network Security Operations admin cyber attack PHI IoT training zero- day botnet pentest insider threat VPN compliance BEC escalation hacker IPS Cyber Security incident exploit business continuity WISP identity theft IDS
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
virus
integrity
EDR
MFA
CIA triad
antivirus
rootkit
firewall
resilience
PII
vulnerability
Cyber Defense
risk assessment
social engineering
DDoS
vishing
security policy
IP
bug
confidentiality
phishing
spyware
malware
password
ransomware
HIPAA
spoofing
encryption
FTP
SyssecAdmin
Dark Web
defense evasion
availability
risk
breach
worm
security awareness
spam
passphrase
smishing
IOC
incident response
packet
OS
cryptography
APT
Defense-in-depth
network
Security Operations
admin
cyber attack
PHI
IoT
training
zero-day
botnet
pentest
insider threat
VPN
compliance
BEC
escalation
hacker
IPS
Cyber Security
incident
exploit
business continuity
WISP
identity theft
IDS