PhishingTwo-FactorAuthentication(2FA)VulnerabilityThreatFirewallAccessControlBotnetAntivirusMalwareData LossPrevention(DLP)IncidentResponse(IR)EncryptionEndpointSecurityCyberThreatIntelligence(CTI)PatchDenial ofService(DoS)AttackPublic KeyInfrastructure(PKI)DataBreachPenetrationTestingZero-DayExploitVirtualPrivateNetwork(VPN)RansomwareSocialEngineeringIntrusionDetectionSystem(IDS)CryptographyPhishingTwo-FactorAuthentication(2FA)VulnerabilityThreatFirewallAccessControlBotnetAntivirusMalwareData LossPrevention(DLP)IncidentResponse(IR)EncryptionEndpointSecurityCyberThreatIntelligence(CTI)PatchDenial ofService(DoS)AttackPublic KeyInfrastructure(PKI)DataBreachPenetrationTestingZero-DayExploitVirtualPrivateNetwork(VPN)RansomwareSocialEngineeringIntrusionDetectionSystem(IDS)Cryptography

Essential Cybersecurity Terms - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Phishing
  2. Two-Factor Authentication (2FA)
  3. Vulnerability
  4. Threat
  5. Firewall
  6. Access Control
  7. Botnet
  8. Antivirus
  9. Malware
  10. Data Loss Prevention (DLP)
  11. Incident Response (IR)
  12. Encryption
  13. Endpoint Security
  14. Cyber Threat Intelligence (CTI)
  15. Patch
  16. Denial of Service (DoS) Attack
  17. Public Key Infrastructure (PKI)
  18. Data Breach
  19. Penetration Testing
  20. Zero-Day Exploit
  21. Virtual Private Network (VPN)
  22. Ransomware
  23. Social Engineering
  24. Intrusion Detection System (IDS)
  25. Cryptography