IncidentResponse(IR)Zero-DayExploitCyberThreatIntelligence(CTI)FirewallEndpointSecurityCryptographyVirtualPrivateNetwork(VPN)Public KeyInfrastructure(PKI)MalwareThreatPatchData LossPrevention(DLP)RansomwareAntivirusPenetrationTestingEncryptionBotnetIntrusionDetectionSystem(IDS)SocialEngineeringTwo-FactorAuthentication(2FA)DataBreachPhishingVulnerabilityDenial ofService(DoS)AttackAccessControlIncidentResponse(IR)Zero-DayExploitCyberThreatIntelligence(CTI)FirewallEndpointSecurityCryptographyVirtualPrivateNetwork(VPN)Public KeyInfrastructure(PKI)MalwareThreatPatchData LossPrevention(DLP)RansomwareAntivirusPenetrationTestingEncryptionBotnetIntrusionDetectionSystem(IDS)SocialEngineeringTwo-FactorAuthentication(2FA)DataBreachPhishingVulnerabilityDenial ofService(DoS)AttackAccessControl

Essential Cybersecurity Terms - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Incident Response (IR)
  2. Zero-Day Exploit
  3. Cyber Threat Intelligence (CTI)
  4. Firewall
  5. Endpoint Security
  6. Cryptography
  7. Virtual Private Network (VPN)
  8. Public Key Infrastructure (PKI)
  9. Malware
  10. Threat
  11. Patch
  12. Data Loss Prevention (DLP)
  13. Ransomware
  14. Antivirus
  15. Penetration Testing
  16. Encryption
  17. Botnet
  18. Intrusion Detection System (IDS)
  19. Social Engineering
  20. Two-Factor Authentication (2FA)
  21. Data Breach
  22. Phishing
  23. Vulnerability
  24. Denial of Service (DoS) Attack
  25. Access Control