Digital Certificate Cyberattack Social Engineering Multi-factor authentication (MFA) Compromise Trojan Compliance Whale phishing Sandbox Threat Security Policy Patch Ransomware Software updates Insider Threat Spear phishing Reusing passwords Hashing Scareware Penetration Testing Honeypot Worm Personally identifiable information (PII) Data Loss Prevention (DLP) Backups Intrusion IDS (Intrusion Detection System) Awareness Exploit Backdoor Phishing Screen lock policy Training Encryption Dark web Incident Response Endpoint IPS (Intrusion Prevention System) Botnet Threat Actor Breach Cyber Hygiene Spoofing Risk Assessment Virus Zero- day Threat Intelligence APT (Advanced Persistent Threat) Malware Vulnerability Digital Certificate Cyberattack Social Engineering Multi-factor authentication (MFA) Compromise Trojan Compliance Whale phishing Sandbox Threat Security Policy Patch Ransomware Software updates Insider Threat Spear phishing Reusing passwords Hashing Scareware Penetration Testing Honeypot Worm Personally identifiable information (PII) Data Loss Prevention (DLP) Backups Intrusion IDS (Intrusion Detection System) Awareness Exploit Backdoor Phishing Screen lock policy Training Encryption Dark web Incident Response Endpoint IPS (Intrusion Prevention System) Botnet Threat Actor Breach Cyber Hygiene Spoofing Risk Assessment Virus Zero- day Threat Intelligence APT (Advanced Persistent Threat) Malware Vulnerability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Digital Certificate
Cyberattack
Social Engineering
Multi-factor authentication (MFA)
Compromise
Trojan
Compliance
Whale phishing
Sandbox
Threat
Security Policy
Patch
Ransomware
Software updates
Insider Threat
Spear phishing
Reusing passwords
Hashing
Scareware
Penetration Testing
Honeypot
Worm
Personally identifiable information (PII)
Data Loss Prevention (DLP)
Backups
Intrusion
IDS (Intrusion Detection System)
Awareness
Exploit
Backdoor
Phishing
Screen lock policy
Training
Encryption
Dark web
Incident Response
Endpoint
IPS (Intrusion Prevention System)
Botnet
Threat Actor
Breach
Cyber Hygiene
Spoofing
Risk Assessment
Virus
Zero-day
Threat Intelligence
APT (Advanced Persistent Threat)
Malware
Vulnerability