Worm Encryption Honeypot Cyber Hygiene Phishing Exploit Cyberattack Spoofing Endpoint Dark web Ransomware Social Engineering Sandbox DDoS (Distributed Denial of Service) Security Policy Digital Certificate Virus Data Loss Prevention (DLP) Awareness Spear phishing Penetration Testing Breach IPS (Intrusion Prevention System) Threat Intelligence Trojan Scareware Whale phishing IDS (Intrusion Detection System) Vulnerability Software updates Threat Actor Compromise APT (Advanced Persistent Threat) Insider Threat Intrusion Zero- day Backdoor Personally identifiable information (PII) Botnet Patch Compliance Incident Response Malware Screen lock policy Threat Multi-factor authentication (MFA) Training Backups Firewall Reusing passwords Worm Encryption Honeypot Cyber Hygiene Phishing Exploit Cyberattack Spoofing Endpoint Dark web Ransomware Social Engineering Sandbox DDoS (Distributed Denial of Service) Security Policy Digital Certificate Virus Data Loss Prevention (DLP) Awareness Spear phishing Penetration Testing Breach IPS (Intrusion Prevention System) Threat Intelligence Trojan Scareware Whale phishing IDS (Intrusion Detection System) Vulnerability Software updates Threat Actor Compromise APT (Advanced Persistent Threat) Insider Threat Intrusion Zero- day Backdoor Personally identifiable information (PII) Botnet Patch Compliance Incident Response Malware Screen lock policy Threat Multi-factor authentication (MFA) Training Backups Firewall Reusing passwords
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Worm
Encryption
Honeypot
Cyber Hygiene
Phishing
Exploit
Cyberattack
Spoofing
Endpoint
Dark web
Ransomware
Social Engineering
Sandbox
DDoS (Distributed Denial of Service)
Security Policy
Digital Certificate
Virus
Data Loss Prevention (DLP)
Awareness
Spear phishing
Penetration Testing
Breach
IPS (Intrusion Prevention System)
Threat Intelligence
Trojan
Scareware
Whale phishing
IDS (Intrusion Detection System)
Vulnerability
Software updates
Threat Actor
Compromise
APT (Advanced Persistent Threat)
Insider Threat
Intrusion
Zero-day
Backdoor
Personally identifiable information (PII)
Botnet
Patch
Compliance
Incident Response
Malware
Screen lock policy
Threat
Multi-factor authentication (MFA)
Training
Backups
Firewall
Reusing passwords