WhalephishingIDS(IntrusionDetectionSystem)Personallyidentifiableinformation(PII)SandboxSoftwareupdatesMalwareExploitTrainingVirusBreachBotnetBackdoorWormPhishingZero-dayCompromiseAPT(AdvancedPersistentThreat)PenetrationTestingData LossPrevention(DLP)HoneypotTrojanSocialEngineeringIncidentResponseIntrusionBackupsCyberattackVulnerabilityThreatActorFirewallInsiderThreatReusingpasswordsThreatEndpointDDoS(DistributedDenial ofService)ThreatIntelligenceMulti-factorauthentication(MFA)ScreenlockpolicySecurityPolicyDarkwebRansomwareComplianceSpearphishingIPS(IntrusionPreventionSystem)DigitalCertificateSpoofingAwarenessEncryptionScarewareCyberHygienePatchWhalephishingIDS(IntrusionDetectionSystem)Personallyidentifiableinformation(PII)SandboxSoftwareupdatesMalwareExploitTrainingVirusBreachBotnetBackdoorWormPhishingZero-dayCompromiseAPT(AdvancedPersistentThreat)PenetrationTestingData LossPrevention(DLP)HoneypotTrojanSocialEngineeringIncidentResponseIntrusionBackupsCyberattackVulnerabilityThreatActorFirewallInsiderThreatReusingpasswordsThreatEndpointDDoS(DistributedDenial ofService)ThreatIntelligenceMulti-factorauthentication(MFA)ScreenlockpolicySecurityPolicyDarkwebRansomwareComplianceSpearphishingIPS(IntrusionPreventionSystem)DigitalCertificateSpoofingAwarenessEncryptionScarewareCyberHygienePatch

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Whale phishing
  2. IDS (Intrusion Detection System)
  3. Personally identifiable information (PII)
  4. Sandbox
  5. Software updates
  6. Malware
  7. Exploit
  8. Training
  9. Virus
  10. Breach
  11. Botnet
  12. Backdoor
  13. Worm
  14. Phishing
  15. Zero-day
  16. Compromise
  17. APT (Advanced Persistent Threat)
  18. Penetration Testing
  19. Data Loss Prevention (DLP)
  20. Honeypot
  21. Trojan
  22. Social Engineering
  23. Incident Response
  24. Intrusion
  25. Backups
  26. Cyberattack
  27. Vulnerability
  28. Threat Actor
  29. Firewall
  30. Insider Threat
  31. Reusing passwords
  32. Threat
  33. Endpoint
  34. DDoS (Distributed Denial of Service)
  35. Threat Intelligence
  36. Multi-factor authentication (MFA)
  37. Screen lock policy
  38. Security Policy
  39. Dark web
  40. Ransomware
  41. Compliance
  42. Spear phishing
  43. IPS (Intrusion Prevention System)
  44. Digital Certificate
  45. Spoofing
  46. Awareness
  47. Encryption
  48. Scareware
  49. Cyber Hygiene
  50. Patch