BotnetAccessControlData LossPrevention(DLP)CyberThreatIntelligence(CTI)VirtualPrivateNetwork(VPN)RansomwareEncryptionPatchIntrusionDetectionSystem(IDS)PenetrationTestingThreatDenial ofService(DoS)AttackVulnerabilityZero-DayExploitMalwareCryptographyAntivirusSocialEngineeringIncidentResponse(IR)DataBreachTwo-FactorAuthentication(2FA)PhishingEndpointSecurityFirewallPublic KeyInfrastructure(PKI)BotnetAccessControlData LossPrevention(DLP)CyberThreatIntelligence(CTI)VirtualPrivateNetwork(VPN)RansomwareEncryptionPatchIntrusionDetectionSystem(IDS)PenetrationTestingThreatDenial ofService(DoS)AttackVulnerabilityZero-DayExploitMalwareCryptographyAntivirusSocialEngineeringIncidentResponse(IR)DataBreachTwo-FactorAuthentication(2FA)PhishingEndpointSecurityFirewallPublic KeyInfrastructure(PKI)

Essential Cybersecurity Terms - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Botnet
  2. Access Control
  3. Data Loss Prevention (DLP)
  4. Cyber Threat Intelligence (CTI)
  5. Virtual Private Network (VPN)
  6. Ransomware
  7. Encryption
  8. Patch
  9. Intrusion Detection System (IDS)
  10. Penetration Testing
  11. Threat
  12. Denial of Service (DoS) Attack
  13. Vulnerability
  14. Zero-Day Exploit
  15. Malware
  16. Cryptography
  17. Antivirus
  18. Social Engineering
  19. Incident Response (IR)
  20. Data Breach
  21. Two-Factor Authentication (2FA)
  22. Phishing
  23. Endpoint Security
  24. Firewall
  25. Public Key Infrastructure (PKI)