Threat Actor Threat Intelligence Spear phishing Social Engineering DDoS (Distributed Denial of Service) Spoofing Worm Insider Threat IPS (Intrusion Prevention System) Digital Certificate Awareness Exploit Honeypot Intrusion Personally identifiable information (PII) Backups Virus Screen lock policy Data Loss Prevention (DLP) Compliance Compromise Vulnerability Training Sandbox Endpoint Ransomware Incident Response Reusing passwords IDS (Intrusion Detection System) Cyberattack Dark web Malware APT (Advanced Persistent Threat) Zero- day Firewall Penetration Testing Security Policy Threat Whale phishing Phishing Botnet Patch Scareware Trojan Breach Software updates Cyber Hygiene Encryption Multi-factor authentication (MFA) Backdoor Threat Actor Threat Intelligence Spear phishing Social Engineering DDoS (Distributed Denial of Service) Spoofing Worm Insider Threat IPS (Intrusion Prevention System) Digital Certificate Awareness Exploit Honeypot Intrusion Personally identifiable information (PII) Backups Virus Screen lock policy Data Loss Prevention (DLP) Compliance Compromise Vulnerability Training Sandbox Endpoint Ransomware Incident Response Reusing passwords IDS (Intrusion Detection System) Cyberattack Dark web Malware APT (Advanced Persistent Threat) Zero- day Firewall Penetration Testing Security Policy Threat Whale phishing Phishing Botnet Patch Scareware Trojan Breach Software updates Cyber Hygiene Encryption Multi-factor authentication (MFA) Backdoor
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat Actor
Threat Intelligence
Spear phishing
Social Engineering
DDoS (Distributed Denial of Service)
Spoofing
Worm
Insider Threat
IPS (Intrusion Prevention System)
Digital Certificate
Awareness
Exploit
Honeypot
Intrusion
Personally identifiable information (PII)
Backups
Virus
Screen lock policy
Data Loss Prevention (DLP)
Compliance
Compromise
Vulnerability
Training
Sandbox
Endpoint
Ransomware
Incident Response
Reusing passwords
IDS (Intrusion Detection System)
Cyberattack
Dark web
Malware
APT (Advanced Persistent Threat)
Zero-day
Firewall
Penetration Testing
Security Policy
Threat
Whale phishing
Phishing
Botnet
Patch
Scareware
Trojan
Breach
Software updates
Cyber Hygiene
Encryption
Multi-factor authentication (MFA)
Backdoor