spyware encryption PHI Security Operations zero- day ransomware compliance IDS VPN risk assessment network Dark Web IP breach identity theft WISP FTP malware MFA passphrase spoofing Cyber Security availability incident SyssecAdmin vulnerability escalation resilience IOC OS admin hacker virus risk vishing smishing training security policy social engineering confidentiality defense evasion HIPAA business continuity security awareness EDR rootkit incident response IPS APT cyber attack password Defense- in-depth firewall DDoS BEC botnet CIA triad IoT spam packet integrity bug worm antivirus pentest Cyber Defense phishing insider threat cryptography exploit PII spyware encryption PHI Security Operations zero- day ransomware compliance IDS VPN risk assessment network Dark Web IP breach identity theft WISP FTP malware MFA passphrase spoofing Cyber Security availability incident SyssecAdmin vulnerability escalation resilience IOC OS admin hacker virus risk vishing smishing training security policy social engineering confidentiality defense evasion HIPAA business continuity security awareness EDR rootkit incident response IPS APT cyber attack password Defense- in-depth firewall DDoS BEC botnet CIA triad IoT spam packet integrity bug worm antivirus pentest Cyber Defense phishing insider threat cryptography exploit PII
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
spyware
encryption
PHI
Security Operations
zero-day
ransomware
compliance
IDS
VPN
risk assessment
network
Dark Web
IP
breach
identity theft
WISP
FTP
malware
MFA
passphrase
spoofing
Cyber Security
availability
incident
SyssecAdmin
vulnerability
escalation
resilience
IOC
OS
admin
hacker
virus
risk
vishing
smishing
training
security policy
social engineering
confidentiality
defense evasion
HIPAA
business continuity
security awareness
EDR
rootkit
incident response
IPS
APT
cyber attack
password
Defense-in-depth
firewall
DDoS
BEC
botnet
CIA triad
IoT
spam
packet
integrity
bug
worm
antivirus
pentest
Cyber Defense
phishing
insider threat
cryptography
exploit
PII