Sandbox Botnet Malware Spoofing Patch Whale phishing Digital Certificate Zero- day Trojan Honeypot Backups Personally identifiable information (PII) Cyber Hygiene Compliance IDS (Intrusion Detection System) Screen lock policy Phishing Virus Firewall Spear phishing Cyberattack Threat Actor Vulnerability DDoS (Distributed Denial of Service) APT (Advanced Persistent Threat) Endpoint Incident Response Penetration Testing Reusing passwords Threat Worm Compromise Social Engineering Multi-factor authentication (MFA) Backdoor Data Loss Prevention (DLP) Threat Intelligence Training Security Policy Encryption Exploit IPS (Intrusion Prevention System) Software updates Ransomware Insider Threat Intrusion Scareware Breach Awareness Dark web Sandbox Botnet Malware Spoofing Patch Whale phishing Digital Certificate Zero- day Trojan Honeypot Backups Personally identifiable information (PII) Cyber Hygiene Compliance IDS (Intrusion Detection System) Screen lock policy Phishing Virus Firewall Spear phishing Cyberattack Threat Actor Vulnerability DDoS (Distributed Denial of Service) APT (Advanced Persistent Threat) Endpoint Incident Response Penetration Testing Reusing passwords Threat Worm Compromise Social Engineering Multi-factor authentication (MFA) Backdoor Data Loss Prevention (DLP) Threat Intelligence Training Security Policy Encryption Exploit IPS (Intrusion Prevention System) Software updates Ransomware Insider Threat Intrusion Scareware Breach Awareness Dark web
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Sandbox
Botnet
Malware
Spoofing
Patch
Whale phishing
Digital Certificate
Zero-day
Trojan
Honeypot
Backups
Personally identifiable information (PII)
Cyber Hygiene
Compliance
IDS (Intrusion Detection System)
Screen lock policy
Phishing
Virus
Firewall
Spear phishing
Cyberattack
Threat Actor
Vulnerability
DDoS (Distributed Denial of Service)
APT (Advanced Persistent Threat)
Endpoint
Incident Response
Penetration Testing
Reusing passwords
Threat
Worm
Compromise
Social Engineering
Multi-factor authentication (MFA)
Backdoor
Data Loss Prevention (DLP)
Threat Intelligence
Training
Security Policy
Encryption
Exploit
IPS (Intrusion Prevention System)
Software updates
Ransomware
Insider Threat
Intrusion
Scareware
Breach
Awareness
Dark web