Social Engineering Sandbox Encryption Firewall Backups Dark web Data Loss Prevention (DLP) Incident Response Virus Cyber Hygiene Worm Exploit Botnet Software updates Intrusion Whale phishing IPS (Intrusion Prevention System) Reusing passwords Screen lock policy DDoS (Distributed Denial of Service) Penetration Testing Cyberattack Trojan Phishing Zero- day Personally identifiable information (PII) Patch Compliance Malware Insider Threat Endpoint Awareness Honeypot Compromise Threat Actor Threat Intelligence Breach Scareware IDS (Intrusion Detection System) Digital Certificate Multi-factor authentication (MFA) Spear phishing Vulnerability Security Policy Ransomware APT (Advanced Persistent Threat) Spoofing Backdoor Training Threat Social Engineering Sandbox Encryption Firewall Backups Dark web Data Loss Prevention (DLP) Incident Response Virus Cyber Hygiene Worm Exploit Botnet Software updates Intrusion Whale phishing IPS (Intrusion Prevention System) Reusing passwords Screen lock policy DDoS (Distributed Denial of Service) Penetration Testing Cyberattack Trojan Phishing Zero- day Personally identifiable information (PII) Patch Compliance Malware Insider Threat Endpoint Awareness Honeypot Compromise Threat Actor Threat Intelligence Breach Scareware IDS (Intrusion Detection System) Digital Certificate Multi-factor authentication (MFA) Spear phishing Vulnerability Security Policy Ransomware APT (Advanced Persistent Threat) Spoofing Backdoor Training Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Social Engineering
Sandbox
Encryption
Firewall
Backups
Dark web
Data Loss Prevention (DLP)
Incident Response
Virus
Cyber Hygiene
Worm
Exploit
Botnet
Software updates
Intrusion
Whale phishing
IPS (Intrusion Prevention System)
Reusing passwords
Screen lock policy
DDoS (Distributed Denial of Service)
Penetration Testing
Cyberattack
Trojan
Phishing
Zero-day
Personally identifiable information (PII)
Patch
Compliance
Malware
Insider Threat
Endpoint
Awareness
Honeypot
Compromise
Threat Actor
Threat Intelligence
Breach
Scareware
IDS (Intrusion Detection System)
Digital Certificate
Multi-factor authentication (MFA)
Spear phishing
Vulnerability
Security Policy
Ransomware
APT (Advanced Persistent Threat)
Spoofing
Backdoor
Training
Threat