Public Key Infrastructure (PKI) Social Engineering Threat Patch Virtual Private Network (VPN) Intrusion Detection System (IDS) Data Breach Endpoint Security Antivirus Data Loss Prevention (DLP) Phishing Botnet Access Control Cryptography Denial of Service (DoS) Attack Two-Factor Authentication (2FA) Zero- Day Exploit Cyber Threat Intelligence (CTI) Vulnerability Penetration Testing Encryption Malware Firewall Ransomware Incident Response (IR) Public Key Infrastructure (PKI) Social Engineering Threat Patch Virtual Private Network (VPN) Intrusion Detection System (IDS) Data Breach Endpoint Security Antivirus Data Loss Prevention (DLP) Phishing Botnet Access Control Cryptography Denial of Service (DoS) Attack Two-Factor Authentication (2FA) Zero- Day Exploit Cyber Threat Intelligence (CTI) Vulnerability Penetration Testing Encryption Malware Firewall Ransomware Incident Response (IR)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Public Key Infrastructure (PKI)
Social Engineering
Threat
Patch
Virtual Private Network (VPN)
Intrusion Detection System (IDS)
Data Breach
Endpoint Security
Antivirus
Data Loss Prevention (DLP)
Phishing
Botnet
Access Control
Cryptography
Denial of Service (DoS) Attack
Two-Factor Authentication (2FA)
Zero-Day Exploit
Cyber Threat Intelligence (CTI)
Vulnerability
Penetration Testing
Encryption
Malware
Firewall
Ransomware
Incident Response (IR)