EndpointSecurityZero-DayExploitThreatData LossPrevention(DLP)PenetrationTestingBotnetDataBreachDenial ofService(DoS)AttackPhishingPatchRansomwareVulnerabilityAntivirusIncidentResponse(IR)CryptographyMalwareCyberThreatIntelligence(CTI)IntrusionDetectionSystem(IDS)VirtualPrivateNetwork(VPN)AccessControlFirewallTwo-FactorAuthentication(2FA)SocialEngineeringPublic KeyInfrastructure(PKI)EncryptionEndpointSecurityZero-DayExploitThreatData LossPrevention(DLP)PenetrationTestingBotnetDataBreachDenial ofService(DoS)AttackPhishingPatchRansomwareVulnerabilityAntivirusIncidentResponse(IR)CryptographyMalwareCyberThreatIntelligence(CTI)IntrusionDetectionSystem(IDS)VirtualPrivateNetwork(VPN)AccessControlFirewallTwo-FactorAuthentication(2FA)SocialEngineeringPublic KeyInfrastructure(PKI)Encryption

Essential Cybersecurity Terms - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Endpoint Security
  2. Zero-Day Exploit
  3. Threat
  4. Data Loss Prevention (DLP)
  5. Penetration Testing
  6. Botnet
  7. Data Breach
  8. Denial of Service (DoS) Attack
  9. Phishing
  10. Patch
  11. Ransomware
  12. Vulnerability
  13. Antivirus
  14. Incident Response (IR)
  15. Cryptography
  16. Malware
  17. Cyber Threat Intelligence (CTI)
  18. Intrusion Detection System (IDS)
  19. Virtual Private Network (VPN)
  20. Access Control
  21. Firewall
  22. Two-Factor Authentication (2FA)
  23. Social Engineering
  24. Public Key Infrastructure (PKI)
  25. Encryption