DDoS attack(DistributedDenial ofService)RestrictedcountryKeyloggerPasswordmanagerZeroTrustPublicdataSocialengineeringCredentialstuffingFirewallTokenizationRole-basedtrainingRole-basedaccesscontrolMalwaresmishingSecurityauditRemediationTrainingVirusComplianceconfidentialdataKeeperPolicyViolationRestricteddataIncidentresponsePhishAlertButton(PAB)InsiderthreatattackvectorTailgatingCyberhygieneRansomwarethreatactorpenetrationtestingDarkwebPhishingsandboxspearphishingDatabreachDataclassificationAdwareendpointsecurityMulti-factorauthentication(MFA)BlocklistingAccesscontrolZero-dayexploitPrivilegeescalationIncidentResponseTeamPatchupdatevishingSpoofeddomainVPN(VirtualPrivateNetwork)VulnerabilityMisinformation(AI)DigitalfootprintBYOD(BringYour OwnDevice)CleandeskpolicyBusinessemailcompromise(BEC)Free!DeepfakeEncryptionAcceptableUse PolicyImpersonationSpywareAnnualsecuritytrainingshadowITremovablemediaBruteforceattackbackdoorDDoS attack(DistributedDenial ofService)RestrictedcountryKeyloggerPasswordmanagerZeroTrustPublicdataSocialengineeringCredentialstuffingFirewallTokenizationRole-basedtrainingRole-basedaccesscontrolMalwaresmishingSecurityauditRemediationTrainingVirusComplianceconfidentialdataKeeperPolicyViolationRestricteddataIncidentresponsePhishAlertButton(PAB)InsiderthreatattackvectorTailgatingCyberhygieneRansomwarethreatactorpenetrationtestingDarkwebPhishingsandboxspearphishingDatabreachDataclassificationAdwareendpointsecurityMulti-factorauthentication(MFA)BlocklistingAccesscontrolZero-dayexploitPrivilegeescalationIncidentResponseTeamPatchupdatevishingSpoofeddomainVPN(VirtualPrivateNetwork)VulnerabilityMisinformation(AI)DigitalfootprintBYOD(BringYour OwnDevice)CleandeskpolicyBusinessemailcompromise(BEC)Free!DeepfakeEncryptionAcceptableUse PolicyImpersonationSpywareAnnualsecuritytrainingshadowITremovablemediaBruteforceattackbackdoor

Cybersecurity Awareness Month - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  1. DDoS attack (Distributed Denial of Service)
  2. Restricted country
  3. Keylogger
  4. Password manager
  5. Zero Trust
  6. Public data
  7. Social engineering
  8. Credential stuffing
  9. Firewall
  10. Tokenization
  11. Role-based training
  12. Role-based access control
  13. Malware
  14. smishing
  15. Security audit
  16. Remediation Training
  17. Virus
  18. Compliance
  19. confidential data
  20. Keeper
  21. Policy Violation
  22. Restricted data
  23. Incident response
  24. Phish Alert Button (PAB)
  25. Insider threat
  26. attack vector
  27. Tailgating
  28. Cyber hygiene
  29. Ransomware
  30. threat actor
  31. penetration testing
  32. Dark web
  33. Phishing
  34. sand box
  35. spear phishing
  36. Data breach
  37. Data classification
  38. Adware
  39. endpoint security
  40. Multi-factor authentication (MFA)
  41. Blocklisting
  42. Access control
  43. Zero-day exploit
  44. Privilege escalation
  45. Incident Response Team
  46. Patch update
  47. vishing
  48. Spoofed domain
  49. VPN (Virtual Private Network)
  50. Vulnerability
  51. Misinformation (AI)
  52. Digital footprint
  53. BYOD (Bring Your Own Device)
  54. Clean desk policy
  55. Business email compromise (BEC)
  56. Free!
  57. Deepfake
  58. Encryption
  59. Acceptable Use Policy
  60. Impersonation
  61. Spyware
  62. Annual security training
  63. shadow IT
  64. removable media
  65. Brute force attack
  66. backdoor