PatchZero-DayExploitEndpointSecurityRansomwareAccessControlDenial ofService(DoS)AttackIntrusionDetectionSystem(IDS)Public KeyInfrastructure(PKI)CyberThreatIntelligence(CTI)AntivirusVulnerabilityIncidentResponse(IR)PenetrationTestingMalwareEncryptionDataBreachTwo-FactorAuthentication(2FA)BotnetVirtualPrivateNetwork(VPN)CryptographyPhishingData LossPrevention(DLP)ThreatSocialEngineeringFirewallPatchZero-DayExploitEndpointSecurityRansomwareAccessControlDenial ofService(DoS)AttackIntrusionDetectionSystem(IDS)Public KeyInfrastructure(PKI)CyberThreatIntelligence(CTI)AntivirusVulnerabilityIncidentResponse(IR)PenetrationTestingMalwareEncryptionDataBreachTwo-FactorAuthentication(2FA)BotnetVirtualPrivateNetwork(VPN)CryptographyPhishingData LossPrevention(DLP)ThreatSocialEngineeringFirewall

Essential Cybersecurity Terms - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Patch
  2. Zero-Day Exploit
  3. Endpoint Security
  4. Ransomware
  5. Access Control
  6. Denial of Service (DoS) Attack
  7. Intrusion Detection System (IDS)
  8. Public Key Infrastructure (PKI)
  9. Cyber Threat Intelligence (CTI)
  10. Antivirus
  11. Vulnerability
  12. Incident Response (IR)
  13. Penetration Testing
  14. Malware
  15. Encryption
  16. Data Breach
  17. Two-Factor Authentication (2FA)
  18. Botnet
  19. Virtual Private Network (VPN)
  20. Cryptography
  21. Phishing
  22. Data Loss Prevention (DLP)
  23. Threat
  24. Social Engineering
  25. Firewall