Spoofing Reusing passwords Cyberattack Training Security Policy Exploit Awareness Ransomware Personally identifiable information (PII) Whale phishing Compromise Botnet Penetration Testing Honeypot Software updates Vulnerability APT (Advanced Persistent Threat) Compliance Threat DDoS (Distributed Denial of Service) Zero- day Spear phishing Backups Encryption Sandbox Dark web Scareware Backdoor IPS (Intrusion Prevention System) Multi-factor authentication (MFA) Endpoint Malware Phishing IDS (Intrusion Detection System) Cyber Hygiene Incident Response Intrusion Insider Threat Threat Actor Social Engineering Firewall Data Loss Prevention (DLP) Patch Trojan Worm Threat Intelligence Breach Digital Certificate Screen lock policy Virus Spoofing Reusing passwords Cyberattack Training Security Policy Exploit Awareness Ransomware Personally identifiable information (PII) Whale phishing Compromise Botnet Penetration Testing Honeypot Software updates Vulnerability APT (Advanced Persistent Threat) Compliance Threat DDoS (Distributed Denial of Service) Zero- day Spear phishing Backups Encryption Sandbox Dark web Scareware Backdoor IPS (Intrusion Prevention System) Multi-factor authentication (MFA) Endpoint Malware Phishing IDS (Intrusion Detection System) Cyber Hygiene Incident Response Intrusion Insider Threat Threat Actor Social Engineering Firewall Data Loss Prevention (DLP) Patch Trojan Worm Threat Intelligence Breach Digital Certificate Screen lock policy Virus
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spoofing
Reusing passwords
Cyberattack
Training
Security Policy
Exploit
Awareness
Ransomware
Personally identifiable information (PII)
Whale phishing
Compromise
Botnet
Penetration Testing
Honeypot
Software updates
Vulnerability
APT (Advanced Persistent Threat)
Compliance
Threat
DDoS (Distributed Denial of Service)
Zero-day
Spear phishing
Backups
Encryption
Sandbox
Dark web
Scareware
Backdoor
IPS (Intrusion Prevention System)
Multi-factor authentication (MFA)
Endpoint
Malware
Phishing
IDS (Intrusion Detection System)
Cyber Hygiene
Incident Response
Intrusion
Insider Threat
Threat Actor
Social Engineering
Firewall
Data Loss Prevention (DLP)
Patch
Trojan
Worm
Threat Intelligence
Breach
Digital Certificate
Screen lock policy
Virus