IP availability MFA resilience training WISP incident social engineering IoT risk assessment security awareness passphrase confidentiality OS vishing worm SyssecAdmin ransomware bug rootkit Defense- in-depth HIPAA pentest PII hacker password insider threat integrity encryption phishing IDS virus firewall incident response IPS malware IOC security policy cryptography business continuity breach VPN DDoS admin network spoofing Dark Web cyber attack vulnerability Cyber Defense antivirus identity theft PHI packet spam exploit compliance smishing Cyber Security spyware escalation FTP APT botnet defense evasion CIA triad EDR BEC Security Operations zero- day risk IP availability MFA resilience training WISP incident social engineering IoT risk assessment security awareness passphrase confidentiality OS vishing worm SyssecAdmin ransomware bug rootkit Defense- in-depth HIPAA pentest PII hacker password insider threat integrity encryption phishing IDS virus firewall incident response IPS malware IOC security policy cryptography business continuity breach VPN DDoS admin network spoofing Dark Web cyber attack vulnerability Cyber Defense antivirus identity theft PHI packet spam exploit compliance smishing Cyber Security spyware escalation FTP APT botnet defense evasion CIA triad EDR BEC Security Operations zero- day risk
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IP
availability
MFA
resilience
training
WISP
incident
social engineering
IoT
risk assessment
security awareness
passphrase
confidentiality
OS
vishing
worm
SyssecAdmin
ransomware
bug
rootkit
Defense-in-depth
HIPAA
pentest
PII
hacker
password
insider threat
integrity
encryption
phishing
IDS
virus
firewall
incident response
IPS
malware
IOC
security policy
cryptography
business continuity
breach
VPN
DDoS
admin
network
spoofing
Dark Web
cyber attack
vulnerability
Cyber Defense
antivirus
identity theft
PHI
packet
spam
exploit
compliance
smishing
Cyber Security
spyware
escalation
FTP
APT
botnet
defense evasion
CIA triad
EDR
BEC
Security Operations
zero-day
risk