IDS incident cryptography security policy training FTP escalation malware Security Operations antivirus IOC BEC vulnerability admin social engineering zero- day EDR availability insider threat defense evasion PII hacker firewall phishing virus spam integrity cyber attack APT vishing IoT worm identity theft pentest encryption IP IPS SyssecAdmin security awareness smishing spyware compliance botnet password network risk DDoS CIA triad OS PHI spoofing incident response MFA risk assessment rootkit breach Dark Web WISP passphrase bug business continuity Defense- in-depth HIPAA resilience VPN packet exploit ransomware Cyber Defense confidentiality Cyber Security IDS incident cryptography security policy training FTP escalation malware Security Operations antivirus IOC BEC vulnerability admin social engineering zero- day EDR availability insider threat defense evasion PII hacker firewall phishing virus spam integrity cyber attack APT vishing IoT worm identity theft pentest encryption IP IPS SyssecAdmin security awareness smishing spyware compliance botnet password network risk DDoS CIA triad OS PHI spoofing incident response MFA risk assessment rootkit breach Dark Web WISP passphrase bug business continuity Defense- in-depth HIPAA resilience VPN packet exploit ransomware Cyber Defense confidentiality Cyber Security
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IDS
incident
cryptography
security policy
training
FTP
escalation
malware
Security Operations
antivirus
IOC
BEC
vulnerability
admin
social engineering
zero-day
EDR
availability
insider threat
defense evasion
PII
hacker
firewall
phishing
virus
spam
integrity
cyber attack
APT
vishing
IoT
worm
identity theft
pentest
encryption
IP
IPS
SyssecAdmin
security awareness
smishing
spyware
compliance
botnet
password
network
risk
DDoS
CIA triad
OS
PHI
spoofing
incident response
MFA
risk assessment
rootkit
breach
Dark Web
WISP
passphrase
bug
business continuity
Defense-in-depth
HIPAA
resilience
VPN
packet
exploit
ransomware
Cyber Defense
confidentiality
Cyber Security