DDoS attack(DistributedDenial ofService)DataclassificationendpointsecurityEncryptionMisinformation(AI)DigitalfootprintspearphishingthreatactorRemediationTrainingFree!BlocklistingSocialengineeringPatchupdateshadowITIncidentresponsesandboxCyberhygieneAnnualsecuritytrainingremovablemediaVPN(VirtualPrivateNetwork)PrivilegeescalationbackdoorSpoofeddomainComplianceAcceptableUse PolicyPhishAlertButton(PAB)vishingPhishingBusinessemailcompromise(BEC)FirewallattackvectorBruteforceattackAccesscontrolRole-basedaccesscontrolCredentialstuffingTokenizationIncidentResponseTeamZero-dayexploitKeyloggerRansomwareImpersonationRestricteddataSecurityauditDeepfakeconfidentialdataRestrictedcountryVulnerabilityInsiderthreatPolicyViolationCleandeskpolicyMulti-factorauthentication(MFA)PublicdataMalwareVirusRole-basedtrainingZeroTrustAdwareBYOD(BringYour OwnDevice)smishingPasswordmanagerpenetrationtestingKeeperTailgatingSpywareDarkwebDatabreachDDoS attack(DistributedDenial ofService)DataclassificationendpointsecurityEncryptionMisinformation(AI)DigitalfootprintspearphishingthreatactorRemediationTrainingFree!BlocklistingSocialengineeringPatchupdateshadowITIncidentresponsesandboxCyberhygieneAnnualsecuritytrainingremovablemediaVPN(VirtualPrivateNetwork)PrivilegeescalationbackdoorSpoofeddomainComplianceAcceptableUse PolicyPhishAlertButton(PAB)vishingPhishingBusinessemailcompromise(BEC)FirewallattackvectorBruteforceattackAccesscontrolRole-basedaccesscontrolCredentialstuffingTokenizationIncidentResponseTeamZero-dayexploitKeyloggerRansomwareImpersonationRestricteddataSecurityauditDeepfakeconfidentialdataRestrictedcountryVulnerabilityInsiderthreatPolicyViolationCleandeskpolicyMulti-factorauthentication(MFA)PublicdataMalwareVirusRole-basedtrainingZeroTrustAdwareBYOD(BringYour OwnDevice)smishingPasswordmanagerpenetrationtestingKeeperTailgatingSpywareDarkwebDatabreach

Cybersecurity Awareness Month - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. DDoS attack (Distributed Denial of Service)
  2. Data classification
  3. endpoint security
  4. Encryption
  5. Misinformation (AI)
  6. Digital footprint
  7. spear phishing
  8. threat actor
  9. Remediation Training
  10. Free!
  11. Blocklisting
  12. Social engineering
  13. Patch update
  14. shadow IT
  15. Incident response
  16. sand box
  17. Cyber hygiene
  18. Annual security training
  19. removable media
  20. VPN (Virtual Private Network)
  21. Privilege escalation
  22. backdoor
  23. Spoofed domain
  24. Compliance
  25. Acceptable Use Policy
  26. Phish Alert Button (PAB)
  27. vishing
  28. Phishing
  29. Business email compromise (BEC)
  30. Firewall
  31. attack vector
  32. Brute force attack
  33. Access control
  34. Role-based access control
  35. Credential stuffing
  36. Tokenization
  37. Incident Response Team
  38. Zero-day exploit
  39. Keylogger
  40. Ransomware
  41. Impersonation
  42. Restricted data
  43. Security audit
  44. Deepfake
  45. confidential data
  46. Restricted country
  47. Vulnerability
  48. Insider threat
  49. Policy Violation
  50. Clean desk policy
  51. Multi-factor authentication (MFA)
  52. Public data
  53. Malware
  54. Virus
  55. Role-based training
  56. Zero Trust
  57. Adware
  58. BYOD (Bring Your Own Device)
  59. smishing
  60. Password manager
  61. penetration testing
  62. Keeper
  63. Tailgating
  64. Spyware
  65. Dark web
  66. Data breach