Honeypot Exploit Training Backups Awareness Cyberattack Trojan Compromise Endpoint Malware Digital Certificate Cyber Hygiene Reusing passwords Insider Threat Data Loss Prevention (DLP) Ransomware Screen lock policy Virus Dark web Security Policy Threat Actor Breach APT (Advanced Persistent Threat) Spoofing Multi-factor authentication (MFA) Threat Intelligence IPS (Intrusion Prevention System) Patch Spear phishing Whale phishing Encryption Backdoor Threat Social Engineering Hashing Worm Incident Response Intrusion Sandbox Personally identifiable information (PII) Software updates Compliance Penetration Testing Scareware Vulnerability Phishing IDS (Intrusion Detection System) Risk Assessment Zero- day Botnet Honeypot Exploit Training Backups Awareness Cyberattack Trojan Compromise Endpoint Malware Digital Certificate Cyber Hygiene Reusing passwords Insider Threat Data Loss Prevention (DLP) Ransomware Screen lock policy Virus Dark web Security Policy Threat Actor Breach APT (Advanced Persistent Threat) Spoofing Multi-factor authentication (MFA) Threat Intelligence IPS (Intrusion Prevention System) Patch Spear phishing Whale phishing Encryption Backdoor Threat Social Engineering Hashing Worm Incident Response Intrusion Sandbox Personally identifiable information (PII) Software updates Compliance Penetration Testing Scareware Vulnerability Phishing IDS (Intrusion Detection System) Risk Assessment Zero- day Botnet
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Honeypot
Exploit
Training
Backups
Awareness
Cyberattack
Trojan
Compromise
Endpoint
Malware
Digital Certificate
Cyber Hygiene
Reusing passwords
Insider Threat
Data Loss Prevention (DLP)
Ransomware
Screen lock policy
Virus
Dark web
Security Policy
Threat Actor
Breach
APT (Advanced Persistent Threat)
Spoofing
Multi-factor authentication (MFA)
Threat Intelligence
IPS (Intrusion Prevention System)
Patch
Spear phishing
Whale phishing
Encryption
Backdoor
Threat
Social Engineering
Hashing
Worm
Incident Response
Intrusion
Sandbox
Personally identifiable information (PII)
Software updates
Compliance
Penetration Testing
Scareware
Vulnerability
Phishing
IDS (Intrusion Detection System)
Risk Assessment
Zero-day
Botnet