Insider Threat Firewall SQL Injection Patch Management Ransomware Threat Hunting Malware Public Key Infrastructure (PKI) Keylogger Dark Web Two-Factor Authentication (2FA) Cyber Hygiene VPN Encryption DDoS Attack Penetration Testing Botnet Zero- Day Exploit Vulnerability Cyber Threat Intelligence Incident Response Data Breach Free! Antivirus Social Engineering Phishing Insider Threat Firewall SQL Injection Patch Management Ransomware Threat Hunting Malware Public Key Infrastructure (PKI) Keylogger Dark Web Two-Factor Authentication (2FA) Cyber Hygiene VPN Encryption DDoS Attack Penetration Testing Botnet Zero- Day Exploit Vulnerability Cyber Threat Intelligence Incident Response Data Breach Free! Antivirus Social Engineering Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Insider Threat
Firewall
SQL Injection
Patch Management
Ransomware
Threat Hunting
Malware
Public Key Infrastructure (PKI)
Keylogger
Dark Web
Two-Factor Authentication (2FA)
Cyber Hygiene
VPN
Encryption
DDoS Attack
Penetration Testing
Botnet
Zero-Day Exploit
Vulnerability
Cyber Threat Intelligence
Incident Response
Data Breach
Free!
Antivirus
Social Engineering
Phishing