availability BEC OS APT CIA triad identity theft EDR business continuity worm risk assessment IOC smishing escalation vulnerability WISP vishing SyssecAdmin passphrase phishing spam Cyber Security social engineering incident response packet botnet encryption firewall Cyber Defense Dark Web Defense- in-depth FTP spyware bug insider threat zero- day training IP HIPAA rootkit IoT confidentiality compliance password pentest antivirus PII spoofing risk virus exploit cyber attack security policy MFA IPS PHI VPN hacker network DDoS IDS defense evasion malware breach incident admin cryptography integrity security awareness resilience ransomware Security Operations availability BEC OS APT CIA triad identity theft EDR business continuity worm risk assessment IOC smishing escalation vulnerability WISP vishing SyssecAdmin passphrase phishing spam Cyber Security social engineering incident response packet botnet encryption firewall Cyber Defense Dark Web Defense- in-depth FTP spyware bug insider threat zero- day training IP HIPAA rootkit IoT confidentiality compliance password pentest antivirus PII spoofing risk virus exploit cyber attack security policy MFA IPS PHI VPN hacker network DDoS IDS defense evasion malware breach incident admin cryptography integrity security awareness resilience ransomware Security Operations
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
availability
BEC
OS
APT
CIA triad
identity theft
EDR
business continuity
worm
risk assessment
IOC
smishing
escalation
vulnerability
WISP
vishing
SyssecAdmin
passphrase
phishing
spam
Cyber Security
social engineering
incident response
packet
botnet
encryption
firewall
Cyber Defense
Dark Web
Defense-in-depth
FTP
spyware
bug
insider threat
zero-day
training
IP
HIPAA
rootkit
IoT
confidentiality
compliance
password
pentest
antivirus
PII
spoofing
risk
virus
exploit
cyber attack
security policy
MFA
IPS
PHI
VPN
hacker
network
DDoS
IDS
defense evasion
malware
breach
incident
admin
cryptography
integrity
security awareness
resilience
ransomware
Security Operations