availability hacker vishing HIPAA CIA triad SyssecAdmin Defense- in-depth passphrase EDR firewall vulnerability training cyber attack antivirus incident response ransomware security awareness DDoS phishing zero- day IOC spam identity theft FTP spoofing Security Operations Cyber Defense packet MFA worm virus breach confidentiality compliance password smishing security policy WISP botnet integrity encryption admin BEC malware business continuity Dark Web social engineering exploit resilience cryptography PHI OS PII escalation spyware APT IP IPS risk risk assessment Cyber Security network rootkit defense evasion VPN insider threat IoT IDS incident bug pentest availability hacker vishing HIPAA CIA triad SyssecAdmin Defense- in-depth passphrase EDR firewall vulnerability training cyber attack antivirus incident response ransomware security awareness DDoS phishing zero- day IOC spam identity theft FTP spoofing Security Operations Cyber Defense packet MFA worm virus breach confidentiality compliance password smishing security policy WISP botnet integrity encryption admin BEC malware business continuity Dark Web social engineering exploit resilience cryptography PHI OS PII escalation spyware APT IP IPS risk risk assessment Cyber Security network rootkit defense evasion VPN insider threat IoT IDS incident bug pentest
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
availability
hacker
vishing
HIPAA
CIA triad
SyssecAdmin
Defense-in-depth
passphrase
EDR
firewall
vulnerability
training
cyber attack
antivirus
incident response
ransomware
security awareness
DDoS
phishing
zero-day
IOC
spam
identity theft
FTP
spoofing
Security Operations
Cyber Defense
packet
MFA
worm
virus
breach
confidentiality
compliance
password
smishing
security policy
WISP
botnet
integrity
encryption
admin
BEC
malware
business continuity
Dark Web
social engineering
exploit
resilience
cryptography
PHI
OS
PII
escalation
spyware
APT
IP
IPS
risk
risk assessment
Cyber Security
network
rootkit
defense evasion
VPN
insider threat
IoT
IDS
incident
bug
pentest