Phishing Compliance Virus Dark web Risk Assessment Personally identifiable information (PII) Incident Response Ransomware Training Threat Malware Worm Threat Actor Zero- day Spoofing Vulnerability Breach Scareware Whale phishing Hashing APT (Advanced Persistent Threat) Multi-factor authentication (MFA) Awareness Patch Spear phishing Encryption Threat Intelligence Cyber Hygiene IPS (Intrusion Prevention System) Compromise Screen lock policy Insider Threat Backups Penetration Testing Reusing passwords Honeypot Cyberattack Trojan Digital Certificate Botnet Intrusion Backdoor Sandbox Data Loss Prevention (DLP) Security Policy Endpoint IDS (Intrusion Detection System) Exploit Software updates Social Engineering Phishing Compliance Virus Dark web Risk Assessment Personally identifiable information (PII) Incident Response Ransomware Training Threat Malware Worm Threat Actor Zero- day Spoofing Vulnerability Breach Scareware Whale phishing Hashing APT (Advanced Persistent Threat) Multi-factor authentication (MFA) Awareness Patch Spear phishing Encryption Threat Intelligence Cyber Hygiene IPS (Intrusion Prevention System) Compromise Screen lock policy Insider Threat Backups Penetration Testing Reusing passwords Honeypot Cyberattack Trojan Digital Certificate Botnet Intrusion Backdoor Sandbox Data Loss Prevention (DLP) Security Policy Endpoint IDS (Intrusion Detection System) Exploit Software updates Social Engineering
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Compliance
Virus
Dark web
Risk Assessment
Personally identifiable information (PII)
Incident Response
Ransomware
Training
Threat
Malware
Worm
Threat Actor
Zero-day
Spoofing
Vulnerability
Breach
Scareware
Whale phishing
Hashing
APT (Advanced Persistent Threat)
Multi-factor authentication (MFA)
Awareness
Patch
Spear phishing
Encryption
Threat Intelligence
Cyber Hygiene
IPS (Intrusion Prevention System)
Compromise
Screen lock policy
Insider Threat
Backups
Penetration Testing
Reusing passwords
Honeypot
Cyberattack
Trojan
Digital Certificate
Botnet
Intrusion
Backdoor
Sandbox
Data Loss Prevention (DLP)
Security Policy
Endpoint
IDS (Intrusion Detection System)
Exploit
Software updates
Social Engineering