IoT confidentiality IDS Cyber Security network identity theft breach packet phishing worm spyware PII cyber attack training password antivirus encryption passphrase defense evasion security awareness WISP MFA firewall IP availability SyssecAdmin spoofing Security Operations spam incident response CIA triad insider threat risk assessment zero- day vulnerability IOC DDoS smishing compliance PHI integrity security policy VPN Dark Web APT malware ransomware cryptography HIPAA pentest Defense- in-depth social engineering risk rootkit vishing botnet virus EDR escalation FTP hacker bug business continuity BEC IPS admin resilience incident OS Cyber Defense exploit IoT confidentiality IDS Cyber Security network identity theft breach packet phishing worm spyware PII cyber attack training password antivirus encryption passphrase defense evasion security awareness WISP MFA firewall IP availability SyssecAdmin spoofing Security Operations spam incident response CIA triad insider threat risk assessment zero- day vulnerability IOC DDoS smishing compliance PHI integrity security policy VPN Dark Web APT malware ransomware cryptography HIPAA pentest Defense- in-depth social engineering risk rootkit vishing botnet virus EDR escalation FTP hacker bug business continuity BEC IPS admin resilience incident OS Cyber Defense exploit
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IoT
confidentiality
IDS
Cyber Security
network
identity theft
breach
packet
phishing
worm
spyware
PII
cyber attack
training
password
antivirus
encryption
passphrase
defense evasion
security awareness
WISP
MFA
firewall
IP
availability
SyssecAdmin
spoofing
Security Operations
spam
incident response
CIA triad
insider threat
risk assessment
zero-day
vulnerability
IOC
DDoS
smishing
compliance
PHI
integrity
security policy
VPN
Dark Web
APT
malware
ransomware
cryptography
HIPAA
pentest
Defense-in-depth
social engineering
risk
rootkit
vishing
botnet
virus
EDR
escalation
FTP
hacker
bug
business continuity
BEC
IPS
admin
resilience
incident
OS
Cyber Defense
exploit