IDS malware confidentiality identity theft training exploit escalation insider threat virus SyssecAdmin cyber attack MFA firewall pentest smishing vishing spam EDR vulnerability zero- day resilience risk antivirus IPS compliance HIPAA VPN IP PII APT WISP passphrase security awareness hacker spyware risk assessment ransomware network Security Operations rootkit CIA triad IoT business continuity packet encryption PHI FTP admin Dark Web bug BEC security policy phishing worm integrity password breach Defense- in-depth cryptography social engineering spoofing botnet Cyber Security availability IOC incident response DDoS Cyber Defense incident OS defense evasion IDS malware confidentiality identity theft training exploit escalation insider threat virus SyssecAdmin cyber attack MFA firewall pentest smishing vishing spam EDR vulnerability zero- day resilience risk antivirus IPS compliance HIPAA VPN IP PII APT WISP passphrase security awareness hacker spyware risk assessment ransomware network Security Operations rootkit CIA triad IoT business continuity packet encryption PHI FTP admin Dark Web bug BEC security policy phishing worm integrity password breach Defense- in-depth cryptography social engineering spoofing botnet Cyber Security availability IOC incident response DDoS Cyber Defense incident OS defense evasion
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IDS
malware
confidentiality
identity theft
training
exploit
escalation
insider threat
virus
SyssecAdmin
cyber attack
MFA
firewall
pentest
smishing
vishing
spam
EDR
vulnerability
zero-day
resilience
risk
antivirus
IPS
compliance
HIPAA
VPN
IP
PII
APT
WISP
passphrase
security awareness
hacker
spyware
risk assessment
ransomware
network
Security Operations
rootkit
CIA triad
IoT
business continuity
packet
encryption
PHI
FTP
admin
Dark Web
bug
BEC
security policy
phishing
worm
integrity
password
breach
Defense-in-depth
cryptography
social engineering
spoofing
botnet
Cyber Security
availability
IOC
incident response
DDoS
Cyber Defense
incident
OS
defense evasion