Public KeyInfrastructure(PKI)SocialEngineeringThreatPatchVirtualPrivateNetwork(VPN)IntrusionDetectionSystem(IDS)DataBreachEndpointSecurityAntivirusData LossPrevention(DLP)PhishingBotnetAccessControlCryptographyDenial ofService(DoS)AttackTwo-FactorAuthentication(2FA)Zero-DayExploitCyberThreatIntelligence(CTI)VulnerabilityPenetrationTestingEncryptionMalwareFirewallRansomwareIncidentResponse(IR)Public KeyInfrastructure(PKI)SocialEngineeringThreatPatchVirtualPrivateNetwork(VPN)IntrusionDetectionSystem(IDS)DataBreachEndpointSecurityAntivirusData LossPrevention(DLP)PhishingBotnetAccessControlCryptographyDenial ofService(DoS)AttackTwo-FactorAuthentication(2FA)Zero-DayExploitCyberThreatIntelligence(CTI)VulnerabilityPenetrationTestingEncryptionMalwareFirewallRansomwareIncidentResponse(IR)

Essential Cybersecurity Terms - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Public Key Infrastructure (PKI)
  2. Social Engineering
  3. Threat
  4. Patch
  5. Virtual Private Network (VPN)
  6. Intrusion Detection System (IDS)
  7. Data Breach
  8. Endpoint Security
  9. Antivirus
  10. Data Loss Prevention (DLP)
  11. Phishing
  12. Botnet
  13. Access Control
  14. Cryptography
  15. Denial of Service (DoS) Attack
  16. Two-Factor Authentication (2FA)
  17. Zero-Day Exploit
  18. Cyber Threat Intelligence (CTI)
  19. Vulnerability
  20. Penetration Testing
  21. Encryption
  22. Malware
  23. Firewall
  24. Ransomware
  25. Incident Response (IR)