Penetration Testing Threat Intelligence Cyberattack Worm Honeypot Training Digital Certificate Backups Cyber Hygiene Encryption Phishing Patch Dark web Incident Response Ransomware Zero- day Virus Multi-factor authentication (MFA) Spear phishing Malware Vulnerability Insider Threat Personally identifiable information (PII) Endpoint Whale phishing Exploit Threat Actor Awareness Social Engineering APT (Advanced Persistent Threat) Reusing passwords Backdoor Threat Trojan Screen lock policy Security Policy Scareware Data Loss Prevention (DLP) Botnet Intrusion Compromise Breach Spoofing Software updates Compliance Penetration Testing Threat Intelligence Cyberattack Worm Honeypot Training Digital Certificate Backups Cyber Hygiene Encryption Phishing Patch Dark web Incident Response Ransomware Zero- day Virus Multi-factor authentication (MFA) Spear phishing Malware Vulnerability Insider Threat Personally identifiable information (PII) Endpoint Whale phishing Exploit Threat Actor Awareness Social Engineering APT (Advanced Persistent Threat) Reusing passwords Backdoor Threat Trojan Screen lock policy Security Policy Scareware Data Loss Prevention (DLP) Botnet Intrusion Compromise Breach Spoofing Software updates Compliance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Penetration Testing
Threat Intelligence
Cyberattack
Worm
Honeypot
Training
Digital Certificate
Backups
Cyber Hygiene
Encryption
Phishing
Patch
Dark web
Incident Response
Ransomware
Zero-day
Virus
Multi-factor authentication (MFA)
Spear phishing
Malware
Vulnerability
Insider Threat
Personally identifiable information (PII)
Endpoint
Whale phishing
Exploit
Threat Actor
Awareness
Social Engineering
APT (Advanced Persistent Threat)
Reusing passwords
Backdoor
Threat
Trojan
Screen lock policy
Security Policy
Scareware
Data Loss Prevention (DLP)
Botnet
Intrusion
Compromise
Breach
Spoofing
Software updates
Compliance