PatchCyberThreatIntelligence(CTI)SocialEngineeringPublic KeyInfrastructure(PKI)VirtualPrivateNetwork(VPN)EncryptionCryptographyEndpointSecurityData LossPrevention(DLP)FirewallAntivirusMalwareThreatIntrusionDetectionSystem(IDS)BotnetPenetrationTestingAccessControlDataBreachVulnerabilityPhishingTwo-FactorAuthentication(2FA)Zero-DayExploitDenial ofService(DoS)AttackIncidentResponse(IR)RansomwarePatchCyberThreatIntelligence(CTI)SocialEngineeringPublic KeyInfrastructure(PKI)VirtualPrivateNetwork(VPN)EncryptionCryptographyEndpointSecurityData LossPrevention(DLP)FirewallAntivirusMalwareThreatIntrusionDetectionSystem(IDS)BotnetPenetrationTestingAccessControlDataBreachVulnerabilityPhishingTwo-FactorAuthentication(2FA)Zero-DayExploitDenial ofService(DoS)AttackIncidentResponse(IR)Ransomware

Essential Cybersecurity Terms - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Patch
  2. Cyber Threat Intelligence (CTI)
  3. Social Engineering
  4. Public Key Infrastructure (PKI)
  5. Virtual Private Network (VPN)
  6. Encryption
  7. Cryptography
  8. Endpoint Security
  9. Data Loss Prevention (DLP)
  10. Firewall
  11. Antivirus
  12. Malware
  13. Threat
  14. Intrusion Detection System (IDS)
  15. Botnet
  16. Penetration Testing
  17. Access Control
  18. Data Breach
  19. Vulnerability
  20. Phishing
  21. Two-Factor Authentication (2FA)
  22. Zero-Day Exploit
  23. Denial of Service (DoS) Attack
  24. Incident Response (IR)
  25. Ransomware