VulnerabilityRansomwareAntivirusEncryptionMalwareDenial ofService(DoS)AttackZero-DayExploitAccessControlPenetrationTestingBotnetPublic KeyInfrastructure(PKI)ThreatTwo-FactorAuthentication(2FA)PatchSocialEngineeringData LossPrevention(DLP)IncidentResponse(IR)VirtualPrivateNetwork(VPN)PhishingCyberThreatIntelligence(CTI)CryptographyIntrusionDetectionSystem(IDS)FirewallEndpointSecurityDataBreachVulnerabilityRansomwareAntivirusEncryptionMalwareDenial ofService(DoS)AttackZero-DayExploitAccessControlPenetrationTestingBotnetPublic KeyInfrastructure(PKI)ThreatTwo-FactorAuthentication(2FA)PatchSocialEngineeringData LossPrevention(DLP)IncidentResponse(IR)VirtualPrivateNetwork(VPN)PhishingCyberThreatIntelligence(CTI)CryptographyIntrusionDetectionSystem(IDS)FirewallEndpointSecurityDataBreach

Essential Cybersecurity Terms - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Vulnerability
  2. Ransomware
  3. Antivirus
  4. Encryption
  5. Malware
  6. Denial of Service (DoS) Attack
  7. Zero-Day Exploit
  8. Access Control
  9. Penetration Testing
  10. Botnet
  11. Public Key Infrastructure (PKI)
  12. Threat
  13. Two-Factor Authentication (2FA)
  14. Patch
  15. Social Engineering
  16. Data Loss Prevention (DLP)
  17. Incident Response (IR)
  18. Virtual Private Network (VPN)
  19. Phishing
  20. Cyber Threat Intelligence (CTI)
  21. Cryptography
  22. Intrusion Detection System (IDS)
  23. Firewall
  24. Endpoint Security
  25. Data Breach