Digital Certificate Intrusion Reusing passwords Spoofing Multi-factor authentication (MFA) Insider Threat Backups Botnet Endpoint Whale phishing Encryption Breach Zero- day Exploit Worm Phishing Ransomware Threat Actor Trojan Security Policy Threat Virus Awareness Compromise Data Loss Prevention (DLP) Incident Response Spear phishing Cyber Hygiene Threat Intelligence Screen lock policy Training Honeypot Scareware Software updates Vulnerability Social Engineering Patch Cyberattack Dark web Penetration Testing Compliance Malware Personally identifiable information (PII) APT (Advanced Persistent Threat) Backdoor Digital Certificate Intrusion Reusing passwords Spoofing Multi-factor authentication (MFA) Insider Threat Backups Botnet Endpoint Whale phishing Encryption Breach Zero- day Exploit Worm Phishing Ransomware Threat Actor Trojan Security Policy Threat Virus Awareness Compromise Data Loss Prevention (DLP) Incident Response Spear phishing Cyber Hygiene Threat Intelligence Screen lock policy Training Honeypot Scareware Software updates Vulnerability Social Engineering Patch Cyberattack Dark web Penetration Testing Compliance Malware Personally identifiable information (PII) APT (Advanced Persistent Threat) Backdoor
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Digital Certificate
Intrusion
Reusing passwords
Spoofing
Multi-factor authentication (MFA)
Insider Threat
Backups
Botnet
Endpoint
Whale phishing
Encryption
Breach
Zero-day
Exploit
Worm
Phishing
Ransomware
Threat Actor
Trojan
Security Policy
Threat
Virus
Awareness
Compromise
Data Loss Prevention (DLP)
Incident Response
Spear phishing
Cyber Hygiene
Threat Intelligence
Screen lock policy
Training
Honeypot
Scareware
Software updates
Vulnerability
Social Engineering
Patch
Cyberattack
Dark web
Penetration Testing
Compliance
Malware
Personally identifiable information (PII)
APT (Advanced Persistent Threat)
Backdoor