password encryption CIA triad IDS bug virus cyber attack admin defense evasion incident response phishing packet availability OS EDR resilience PHI PII IPS integrity identity theft malware social engineering network SyssecAdmin training security awareness WISP risk vishing rootkit FTP passphrase DDoS smishing risk assessment Defense- in-depth Dark Web IoT Security Operations cryptography ransomware pentest IP APT spyware BEC firewall confidentiality HIPAA worm breach insider threat spoofing antivirus vulnerability botnet IOC MFA security policy Cyber Security exploit escalation compliance zero- day hacker Cyber Defense business continuity spam incident VPN password encryption CIA triad IDS bug virus cyber attack admin defense evasion incident response phishing packet availability OS EDR resilience PHI PII IPS integrity identity theft malware social engineering network SyssecAdmin training security awareness WISP risk vishing rootkit FTP passphrase DDoS smishing risk assessment Defense- in-depth Dark Web IoT Security Operations cryptography ransomware pentest IP APT spyware BEC firewall confidentiality HIPAA worm breach insider threat spoofing antivirus vulnerability botnet IOC MFA security policy Cyber Security exploit escalation compliance zero- day hacker Cyber Defense business continuity spam incident VPN
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
password
encryption
CIA triad
IDS
bug
virus
cyber attack
admin
defense evasion
incident response
phishing
packet
availability
OS
EDR
resilience
PHI
PII
IPS
integrity
identity theft
malware
social engineering
network
SyssecAdmin
training
security awareness
WISP
risk
vishing
rootkit
FTP
passphrase
DDoS
smishing
risk assessment
Defense-in-depth
Dark Web
IoT
Security Operations
cryptography
ransomware
pentest
IP
APT
spyware
BEC
firewall
confidentiality
HIPAA
worm
breach
insider threat
spoofing
antivirus
vulnerability
botnet
IOC
MFA
security policy
Cyber Security
exploit
escalation
compliance
zero-day
hacker
Cyber Defense
business continuity
spam
incident
VPN