rootkit worm security awareness BEC HIPAA CIA triad breach firewall IoT PHI risk incident response APT Dark Web social engineering spoofing passphrase Cyber Defense resilience training Cyber Security OS confidentiality IDS vulnerability Defense- in-depth exploit insider threat compliance risk assessment admin IP cryptography MFA EDR WISP virus FTP spam spyware integrity escalation identity theft encryption Security Operations pentest DDoS security policy cyber attack network bug defense evasion ransomware packet SyssecAdmin business continuity VPN hacker PII incident zero- day malware botnet availability antivirus smishing IPS password phishing vishing IOC rootkit worm security awareness BEC HIPAA CIA triad breach firewall IoT PHI risk incident response APT Dark Web social engineering spoofing passphrase Cyber Defense resilience training Cyber Security OS confidentiality IDS vulnerability Defense- in-depth exploit insider threat compliance risk assessment admin IP cryptography MFA EDR WISP virus FTP spam spyware integrity escalation identity theft encryption Security Operations pentest DDoS security policy cyber attack network bug defense evasion ransomware packet SyssecAdmin business continuity VPN hacker PII incident zero- day malware botnet availability antivirus smishing IPS password phishing vishing IOC
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
rootkit
worm
security awareness
BEC
HIPAA
CIA triad
breach
firewall
IoT
PHI
risk
incident response
APT
Dark Web
social engineering
spoofing
passphrase
Cyber Defense
resilience
training
Cyber Security
OS
confidentiality
IDS
vulnerability
Defense-in-depth
exploit
insider threat
compliance
risk assessment
admin
IP
cryptography
MFA
EDR
WISP
virus
FTP
spam
spyware
integrity
escalation
identity theft
encryption
Security Operations
pentest
DDoS
security policy
cyber attack
network
bug
defense evasion
ransomware
packet
SyssecAdmin
business continuity
VPN
hacker
PII
incident
zero-day
malware
botnet
availability
antivirus
smishing
IPS
password
phishing
vishing
IOC