Botnet Encryption Trojan Endpoint Cyber Hygiene Zero- day Multi-factor authentication (MFA) Compliance Security Policy Spoofing Data Loss Prevention (DLP) Phishing Digital Certificate Spear phishing Screen lock policy Personally identifiable information (PII) Dark web Honeypot Breach Threat Ransomware Virus Insider Threat Scareware Exploit Patch Incident Response Software updates Training Worm Whale phishing Awareness Malware Backups Threat Actor Threat Intelligence Vulnerability Reusing passwords Backdoor APT (Advanced Persistent Threat) Social Engineering Penetration Testing Intrusion Compromise Cyberattack Botnet Encryption Trojan Endpoint Cyber Hygiene Zero- day Multi-factor authentication (MFA) Compliance Security Policy Spoofing Data Loss Prevention (DLP) Phishing Digital Certificate Spear phishing Screen lock policy Personally identifiable information (PII) Dark web Honeypot Breach Threat Ransomware Virus Insider Threat Scareware Exploit Patch Incident Response Software updates Training Worm Whale phishing Awareness Malware Backups Threat Actor Threat Intelligence Vulnerability Reusing passwords Backdoor APT (Advanced Persistent Threat) Social Engineering Penetration Testing Intrusion Compromise Cyberattack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Botnet
Encryption
Trojan
Endpoint
Cyber Hygiene
Zero-day
Multi-factor authentication (MFA)
Compliance
Security Policy
Spoofing
Data Loss Prevention (DLP)
Phishing
Digital Certificate
Spear phishing
Screen lock policy
Personally identifiable information (PII)
Dark web
Honeypot
Breach
Threat
Ransomware
Virus
Insider Threat
Scareware
Exploit
Patch
Incident Response
Software updates
Training
Worm
Whale phishing
Awareness
Malware
Backups
Threat Actor
Threat Intelligence
Vulnerability
Reusing passwords
Backdoor
APT (Advanced Persistent Threat)
Social Engineering
Penetration Testing
Intrusion
Compromise
Cyberattack