IncidentResponse(IR)Public KeyInfrastructure(PKI)VirtualPrivateNetwork(VPN)Data LossPrevention(DLP)EndpointSecurityDenial ofService(DoS)AttackTwo-FactorAuthentication(2FA)SocialEngineeringBotnetThreatAntivirusVulnerabilityCryptographyCyberThreatIntelligence(CTI)FirewallZero-DayExploitMalwareDataBreachPhishingIntrusionDetectionSystem(IDS)EncryptionPatchAccessControlRansomwarePenetrationTestingIncidentResponse(IR)Public KeyInfrastructure(PKI)VirtualPrivateNetwork(VPN)Data LossPrevention(DLP)EndpointSecurityDenial ofService(DoS)AttackTwo-FactorAuthentication(2FA)SocialEngineeringBotnetThreatAntivirusVulnerabilityCryptographyCyberThreatIntelligence(CTI)FirewallZero-DayExploitMalwareDataBreachPhishingIntrusionDetectionSystem(IDS)EncryptionPatchAccessControlRansomwarePenetrationTesting

Essential Cybersecurity Terms - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Incident Response (IR)
  2. Public Key Infrastructure (PKI)
  3. Virtual Private Network (VPN)
  4. Data Loss Prevention (DLP)
  5. Endpoint Security
  6. Denial of Service (DoS) Attack
  7. Two-Factor Authentication (2FA)
  8. Social Engineering
  9. Botnet
  10. Threat
  11. Antivirus
  12. Vulnerability
  13. Cryptography
  14. Cyber Threat Intelligence (CTI)
  15. Firewall
  16. Zero-Day Exploit
  17. Malware
  18. Data Breach
  19. Phishing
  20. Intrusion Detection System (IDS)
  21. Encryption
  22. Patch
  23. Access Control
  24. Ransomware
  25. Penetration Testing