Backups Cyber Hygiene IDS (Intrusion Detection System) Data Loss Prevention (DLP) Penetration Testing Compromise Personally identifiable information (PII) Worm Intrusion Malware Reusing passwords Cyberattack Zero- day Endpoint Phishing Multi-factor authentication (MFA) Virus Trojan Honeypot Firewall Sandbox Software updates Scareware Security Policy Awareness Dark web Ransomware Whale phishing Botnet APT (Advanced Persistent Threat) Spear phishing Insider Threat Incident Response Digital Certificate Breach Social Engineering Threat Actor Screen lock policy DDoS (Distributed Denial of Service) IPS (Intrusion Prevention System) Patch Vulnerability Spoofing Threat Intelligence Encryption Threat Compliance Backdoor Exploit Training Backups Cyber Hygiene IDS (Intrusion Detection System) Data Loss Prevention (DLP) Penetration Testing Compromise Personally identifiable information (PII) Worm Intrusion Malware Reusing passwords Cyberattack Zero- day Endpoint Phishing Multi-factor authentication (MFA) Virus Trojan Honeypot Firewall Sandbox Software updates Scareware Security Policy Awareness Dark web Ransomware Whale phishing Botnet APT (Advanced Persistent Threat) Spear phishing Insider Threat Incident Response Digital Certificate Breach Social Engineering Threat Actor Screen lock policy DDoS (Distributed Denial of Service) IPS (Intrusion Prevention System) Patch Vulnerability Spoofing Threat Intelligence Encryption Threat Compliance Backdoor Exploit Training
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Backups
Cyber Hygiene
IDS (Intrusion Detection System)
Data Loss Prevention (DLP)
Penetration Testing
Compromise
Personally identifiable information (PII)
Worm
Intrusion
Malware
Reusing passwords
Cyberattack
Zero-day
Endpoint
Phishing
Multi-factor authentication (MFA)
Virus
Trojan
Honeypot
Firewall
Sandbox
Software updates
Scareware
Security Policy
Awareness
Dark web
Ransomware
Whale phishing
Botnet
APT (Advanced Persistent Threat)
Spear phishing
Insider Threat
Incident Response
Digital Certificate
Breach
Social Engineering
Threat Actor
Screen lock policy
DDoS (Distributed Denial of Service)
IPS (Intrusion Prevention System)
Patch
Vulnerability
Spoofing
Threat Intelligence
Encryption
Threat
Compliance
Backdoor
Exploit
Training