IncidentResponse(IR)CyberThreatIntelligence(CTI)AccessControlZero-DayExploitDenial ofService(DoS)AttackCryptographyEndpointSecurityEncryptionSocialEngineeringDataBreachBotnetRansomwareFirewallThreatPublic KeyInfrastructure(PKI)MalwarePatchVirtualPrivateNetwork(VPN)Data LossPrevention(DLP)PhishingVulnerabilityPenetrationTestingAntivirusIntrusionDetectionSystem(IDS)Two-FactorAuthentication(2FA)IncidentResponse(IR)CyberThreatIntelligence(CTI)AccessControlZero-DayExploitDenial ofService(DoS)AttackCryptographyEndpointSecurityEncryptionSocialEngineeringDataBreachBotnetRansomwareFirewallThreatPublic KeyInfrastructure(PKI)MalwarePatchVirtualPrivateNetwork(VPN)Data LossPrevention(DLP)PhishingVulnerabilityPenetrationTestingAntivirusIntrusionDetectionSystem(IDS)Two-FactorAuthentication(2FA)

Essential Cybersecurity Terms - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Incident Response (IR)
  2. Cyber Threat Intelligence (CTI)
  3. Access Control
  4. Zero-Day Exploit
  5. Denial of Service (DoS) Attack
  6. Cryptography
  7. Endpoint Security
  8. Encryption
  9. Social Engineering
  10. Data Breach
  11. Botnet
  12. Ransomware
  13. Firewall
  14. Threat
  15. Public Key Infrastructure (PKI)
  16. Malware
  17. Patch
  18. Virtual Private Network (VPN)
  19. Data Loss Prevention (DLP)
  20. Phishing
  21. Vulnerability
  22. Penetration Testing
  23. Antivirus
  24. Intrusion Detection System (IDS)
  25. Two-Factor Authentication (2FA)