Worm Whale phishing Reusing passwords Threat Sandbox Compromise Software updates Scareware Social Engineering Backups Virus Exploit Spear phishing Multi-factor authentication (MFA) APT (Advanced Persistent Threat) Ransomware Training Cyber Hygiene Intrusion IPS (Intrusion Prevention System) Phishing Zero- day Personally identifiable information (PII) Patch Screen lock policy Breach Threat Actor Security Policy Dark web Botnet Hashing Cyberattack Incident Response Penetration Testing Data Loss Prevention (DLP) Honeypot Malware Threat Intelligence Compliance Insider Threat Encryption Risk Assessment Spoofing Trojan Digital Certificate IDS (Intrusion Detection System) Backdoor Vulnerability Endpoint Awareness Worm Whale phishing Reusing passwords Threat Sandbox Compromise Software updates Scareware Social Engineering Backups Virus Exploit Spear phishing Multi-factor authentication (MFA) APT (Advanced Persistent Threat) Ransomware Training Cyber Hygiene Intrusion IPS (Intrusion Prevention System) Phishing Zero- day Personally identifiable information (PII) Patch Screen lock policy Breach Threat Actor Security Policy Dark web Botnet Hashing Cyberattack Incident Response Penetration Testing Data Loss Prevention (DLP) Honeypot Malware Threat Intelligence Compliance Insider Threat Encryption Risk Assessment Spoofing Trojan Digital Certificate IDS (Intrusion Detection System) Backdoor Vulnerability Endpoint Awareness
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Worm
Whale phishing
Reusing passwords
Threat
Sandbox
Compromise
Software updates
Scareware
Social Engineering
Backups
Virus
Exploit
Spear phishing
Multi-factor authentication (MFA)
APT (Advanced Persistent Threat)
Ransomware
Training
Cyber Hygiene
Intrusion
IPS (Intrusion Prevention System)
Phishing
Zero-day
Personally identifiable information (PII)
Patch
Screen lock policy
Breach
Threat Actor
Security Policy
Dark web
Botnet
Hashing
Cyberattack
Incident Response
Penetration Testing
Data Loss Prevention (DLP)
Honeypot
Malware
Threat Intelligence
Compliance
Insider Threat
Encryption
Risk Assessment
Spoofing
Trojan
Digital Certificate
IDS (Intrusion Detection System)
Backdoor
Vulnerability
Endpoint
Awareness