Malware Patch update Adware backdoor Free! Blocklisting Keylogger Virus Public data Encryption Privilege escalation Impersonation Zero- day exploit Data classification Spoofed domain Access control VPN (Virtual Private Network) Firewall Credential stuffing Dark web penetration testing shadow IT Password manager Keeper vishing Compliance Phishing Ransomware Cyber hygiene Role- based access control Data breach Multi-factor authentication (MFA) sand box Acceptable Use Policy Spyware Clean desk policy threat actor endpoint security Tailgating confidential data Misinformation (AI) Remediation Training attack vector Insider threat smishing Zero Trust Social engineering Incident Response Team DDoS attack (Distributed Denial of Service) Phish Alert Button (PAB) Tokenization removable media Business email compromise (BEC) Policy Violation Digital footprint BYOD (Bring Your Own Device) Brute force attack spear phishing Vulnerability Deepfake Security audit Incident response Role- based training Annual security training Restricted data Restricted country Malware Patch update Adware backdoor Free! Blocklisting Keylogger Virus Public data Encryption Privilege escalation Impersonation Zero- day exploit Data classification Spoofed domain Access control VPN (Virtual Private Network) Firewall Credential stuffing Dark web penetration testing shadow IT Password manager Keeper vishing Compliance Phishing Ransomware Cyber hygiene Role- based access control Data breach Multi-factor authentication (MFA) sand box Acceptable Use Policy Spyware Clean desk policy threat actor endpoint security Tailgating confidential data Misinformation (AI) Remediation Training attack vector Insider threat smishing Zero Trust Social engineering Incident Response Team DDoS attack (Distributed Denial of Service) Phish Alert Button (PAB) Tokenization removable media Business email compromise (BEC) Policy Violation Digital footprint BYOD (Bring Your Own Device) Brute force attack spear phishing Vulnerability Deepfake Security audit Incident response Role- based training Annual security training Restricted data Restricted country
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Malware
Patch update
Adware
backdoor
Free!
Blocklisting
Keylogger
Virus
Public data
Encryption
Privilege escalation
Impersonation
Zero-day exploit
Data classification
Spoofed domain
Access control
VPN (Virtual Private Network)
Firewall
Credential stuffing
Dark web
penetration testing
shadow IT
Password manager
Keeper
vishing
Compliance
Phishing
Ransomware
Cyber hygiene
Role-based access control
Data breach
Multi-factor authentication (MFA)
sand box
Acceptable Use Policy
Spyware
Clean desk policy
threat actor
endpoint security
Tailgating
confidential data
Misinformation (AI)
Remediation Training
attack vector
Insider threat
smishing
Zero Trust
Social engineering
Incident Response Team
DDoS attack (Distributed Denial of Service)
Phish Alert Button (PAB)
Tokenization
removable media
Business email compromise (BEC)
Policy Violation
Digital footprint
BYOD (Bring Your Own Device)
Brute force attack
spear phishing
Vulnerability
Deepfake
Security audit
Incident response
Role-based training
Annual security training
Restricted data
Restricted country