Whale phishing IDS (Intrusion Detection System) Personally identifiable information (PII) Sandbox Software updates Malware Exploit Training Virus Breach Botnet Backdoor Worm Phishing Zero- day Compromise APT (Advanced Persistent Threat) Penetration Testing Data Loss Prevention (DLP) Honeypot Trojan Social Engineering Incident Response Intrusion Backups Cyberattack Vulnerability Threat Actor Firewall Insider Threat Reusing passwords Threat Endpoint DDoS (Distributed Denial of Service) Threat Intelligence Multi-factor authentication (MFA) Screen lock policy Security Policy Dark web Ransomware Compliance Spear phishing IPS (Intrusion Prevention System) Digital Certificate Spoofing Awareness Encryption Scareware Cyber Hygiene Patch Whale phishing IDS (Intrusion Detection System) Personally identifiable information (PII) Sandbox Software updates Malware Exploit Training Virus Breach Botnet Backdoor Worm Phishing Zero- day Compromise APT (Advanced Persistent Threat) Penetration Testing Data Loss Prevention (DLP) Honeypot Trojan Social Engineering Incident Response Intrusion Backups Cyberattack Vulnerability Threat Actor Firewall Insider Threat Reusing passwords Threat Endpoint DDoS (Distributed Denial of Service) Threat Intelligence Multi-factor authentication (MFA) Screen lock policy Security Policy Dark web Ransomware Compliance Spear phishing IPS (Intrusion Prevention System) Digital Certificate Spoofing Awareness Encryption Scareware Cyber Hygiene Patch
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Whale phishing
IDS (Intrusion Detection System)
Personally identifiable information (PII)
Sandbox
Software updates
Malware
Exploit
Training
Virus
Breach
Botnet
Backdoor
Worm
Phishing
Zero-day
Compromise
APT (Advanced Persistent Threat)
Penetration Testing
Data Loss Prevention (DLP)
Honeypot
Trojan
Social Engineering
Incident Response
Intrusion
Backups
Cyberattack
Vulnerability
Threat Actor
Firewall
Insider Threat
Reusing passwords
Threat
Endpoint
DDoS (Distributed Denial of Service)
Threat Intelligence
Multi-factor authentication (MFA)
Screen lock policy
Security Policy
Dark web
Ransomware
Compliance
Spear phishing
IPS (Intrusion Prevention System)
Digital Certificate
Spoofing
Awareness
Encryption
Scareware
Cyber Hygiene
Patch