SandboxBotnetMalwareSpoofingPatchWhalephishingDigitalCertificateZero-dayTrojanHoneypotBackupsPersonallyidentifiableinformation(PII)CyberHygieneComplianceIDS(IntrusionDetectionSystem)ScreenlockpolicyPhishingVirusFirewallSpearphishingCyberattackThreatActorVulnerabilityDDoS(DistributedDenial ofService)APT(AdvancedPersistentThreat)EndpointIncidentResponsePenetrationTestingReusingpasswordsThreatWormCompromiseSocialEngineeringMulti-factorauthentication(MFA)BackdoorData LossPrevention(DLP)ThreatIntelligenceTrainingSecurityPolicyEncryptionExploitIPS(IntrusionPreventionSystem)SoftwareupdatesRansomwareInsiderThreatIntrusionScarewareBreachAwarenessDarkwebSandboxBotnetMalwareSpoofingPatchWhalephishingDigitalCertificateZero-dayTrojanHoneypotBackupsPersonallyidentifiableinformation(PII)CyberHygieneComplianceIDS(IntrusionDetectionSystem)ScreenlockpolicyPhishingVirusFirewallSpearphishingCyberattackThreatActorVulnerabilityDDoS(DistributedDenial ofService)APT(AdvancedPersistentThreat)EndpointIncidentResponsePenetrationTestingReusingpasswordsThreatWormCompromiseSocialEngineeringMulti-factorauthentication(MFA)BackdoorData LossPrevention(DLP)ThreatIntelligenceTrainingSecurityPolicyEncryptionExploitIPS(IntrusionPreventionSystem)SoftwareupdatesRansomwareInsiderThreatIntrusionScarewareBreachAwarenessDarkweb

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Sandbox
  2. Botnet
  3. Malware
  4. Spoofing
  5. Patch
  6. Whale phishing
  7. Digital Certificate
  8. Zero-day
  9. Trojan
  10. Honeypot
  11. Backups
  12. Personally identifiable information (PII)
  13. Cyber Hygiene
  14. Compliance
  15. IDS (Intrusion Detection System)
  16. Screen lock policy
  17. Phishing
  18. Virus
  19. Firewall
  20. Spear phishing
  21. Cyberattack
  22. Threat Actor
  23. Vulnerability
  24. DDoS (Distributed Denial of Service)
  25. APT (Advanced Persistent Threat)
  26. Endpoint
  27. Incident Response
  28. Penetration Testing
  29. Reusing passwords
  30. Threat
  31. Worm
  32. Compromise
  33. Social Engineering
  34. Multi-factor authentication (MFA)
  35. Backdoor
  36. Data Loss Prevention (DLP)
  37. Threat Intelligence
  38. Training
  39. Security Policy
  40. Encryption
  41. Exploit
  42. IPS (Intrusion Prevention System)
  43. Software updates
  44. Ransomware
  45. Insider Threat
  46. Intrusion
  47. Scareware
  48. Breach
  49. Awareness
  50. Dark web