Virus Training Software updates Patch IDS (Intrusion Detection System) Cyberattack Cyber Hygiene IPS (Intrusion Prevention System) Encryption Reusing passwords Penetration Testing Threat Intelligence Vulnerability DDoS (Distributed Denial of Service) Ransomware Whale phishing Breach Firewall Zero- day Sandbox Backdoor Insider Threat Threat Actor Spear phishing Backups Intrusion Incident Response Data Loss Prevention (DLP) Compromise Screen lock policy Phishing Spoofing Compliance Digital Certificate Trojan Dark web Security Policy APT (Advanced Persistent Threat) Botnet Scareware Malware Exploit Honeypot Social Engineering Multi-factor authentication (MFA) Awareness Threat Worm Endpoint Personally identifiable information (PII) Virus Training Software updates Patch IDS (Intrusion Detection System) Cyberattack Cyber Hygiene IPS (Intrusion Prevention System) Encryption Reusing passwords Penetration Testing Threat Intelligence Vulnerability DDoS (Distributed Denial of Service) Ransomware Whale phishing Breach Firewall Zero- day Sandbox Backdoor Insider Threat Threat Actor Spear phishing Backups Intrusion Incident Response Data Loss Prevention (DLP) Compromise Screen lock policy Phishing Spoofing Compliance Digital Certificate Trojan Dark web Security Policy APT (Advanced Persistent Threat) Botnet Scareware Malware Exploit Honeypot Social Engineering Multi-factor authentication (MFA) Awareness Threat Worm Endpoint Personally identifiable information (PII)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Virus
Training
Software updates
Patch
IDS (Intrusion Detection System)
Cyberattack
Cyber Hygiene
IPS (Intrusion Prevention System)
Encryption
Reusing passwords
Penetration Testing
Threat Intelligence
Vulnerability
DDoS (Distributed Denial of Service)
Ransomware
Whale phishing
Breach
Firewall
Zero-day
Sandbox
Backdoor
Insider Threat
Threat Actor
Spear phishing
Backups
Intrusion
Incident Response
Data Loss Prevention (DLP)
Compromise
Screen lock policy
Phishing
Spoofing
Compliance
Digital Certificate
Trojan
Dark web
Security Policy
APT (Advanced Persistent Threat)
Botnet
Scareware
Malware
Exploit
Honeypot
Social Engineering
Multi-factor authentication (MFA)
Awareness
Threat
Worm
Endpoint
Personally identifiable information (PII)