Data Breach Free! Encryption Social Engineering Two-Factor Authentication (2FA) Insider Threat Antivirus Keylogger Patch Management VPN Malware Penetration Testing DDoS Attack Public Key Infrastructure (PKI) Threat Hunting Zero- Day Exploit SQL Injection Cyber Threat Intelligence Cyber Hygiene Dark Web Vulnerability Incident Response Firewall Ransomware Botnet Phishing Data Breach Free! Encryption Social Engineering Two-Factor Authentication (2FA) Insider Threat Antivirus Keylogger Patch Management VPN Malware Penetration Testing DDoS Attack Public Key Infrastructure (PKI) Threat Hunting Zero- Day Exploit SQL Injection Cyber Threat Intelligence Cyber Hygiene Dark Web Vulnerability Incident Response Firewall Ransomware Botnet Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Breach
Free!
Encryption
Social Engineering
Two-Factor Authentication (2FA)
Insider Threat
Antivirus
Keylogger
Patch Management
VPN
Malware
Penetration Testing
DDoS Attack
Public Key Infrastructure (PKI)
Threat Hunting
Zero-Day Exploit
SQL Injection
Cyber Threat Intelligence
Cyber Hygiene
Dark Web
Vulnerability
Incident Response
Firewall
Ransomware
Botnet
Phishing