Worm Virus Personally identifiable information (PII) Zero- day Exploit Vulnerability Security Policy Digital Certificate Botnet Trojan Dark web Backdoor Threat Intelligence Awareness IDS (Intrusion Detection System) Whale phishing Compliance Reusing passwords Encryption Malware Honeypot Data Loss Prevention (DLP) Software updates Backups Cyber Hygiene Hashing IPS (Intrusion Prevention System) APT (Advanced Persistent Threat) Cyberattack Spoofing Risk Assessment Incident Response Screen lock policy Multi-factor authentication (MFA) Intrusion Training Threat Social Engineering Phishing Threat Actor Sandbox Spear phishing Insider Threat Endpoint Scareware Penetration Testing Ransomware Patch Breach Compromise Worm Virus Personally identifiable information (PII) Zero- day Exploit Vulnerability Security Policy Digital Certificate Botnet Trojan Dark web Backdoor Threat Intelligence Awareness IDS (Intrusion Detection System) Whale phishing Compliance Reusing passwords Encryption Malware Honeypot Data Loss Prevention (DLP) Software updates Backups Cyber Hygiene Hashing IPS (Intrusion Prevention System) APT (Advanced Persistent Threat) Cyberattack Spoofing Risk Assessment Incident Response Screen lock policy Multi-factor authentication (MFA) Intrusion Training Threat Social Engineering Phishing Threat Actor Sandbox Spear phishing Insider Threat Endpoint Scareware Penetration Testing Ransomware Patch Breach Compromise
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Worm
Virus
Personally identifiable information (PII)
Zero-day
Exploit
Vulnerability
Security Policy
Digital Certificate
Botnet
Trojan
Dark web
Backdoor
Threat Intelligence
Awareness
IDS (Intrusion Detection System)
Whale phishing
Compliance
Reusing passwords
Encryption
Malware
Honeypot
Data Loss Prevention (DLP)
Software updates
Backups
Cyber Hygiene
Hashing
IPS (Intrusion Prevention System)
APT (Advanced Persistent Threat)
Cyberattack
Spoofing
Risk Assessment
Incident Response
Screen lock policy
Multi-factor authentication (MFA)
Intrusion
Training
Threat
Social Engineering
Phishing
Threat Actor
Sandbox
Spear phishing
Insider Threat
Endpoint
Scareware
Penetration Testing
Ransomware
Patch
Breach
Compromise