Intrusion Awareness Patch Breach Threat Endpoint Risk Assessment Social Engineering Threat Actor Multi-factor authentication (MFA) Cyberattack Screen lock policy Compromise Ransomware Software updates Encryption APT (Advanced Persistent Threat) Reusing passwords Hashing Penetration Testing Incident Response Personally identifiable information (PII) Spoofing Botnet Digital Certificate Trojan Cyber Hygiene Exploit Whale phishing Dark web Backdoor Threat Intelligence Data Loss Prevention (DLP) Malware Compliance Security Policy Worm Insider Threat Backups Training IDS (Intrusion Detection System) Phishing Spear phishing Vulnerability Honeypot Virus IPS (Intrusion Prevention System) Sandbox Zero- day Scareware Intrusion Awareness Patch Breach Threat Endpoint Risk Assessment Social Engineering Threat Actor Multi-factor authentication (MFA) Cyberattack Screen lock policy Compromise Ransomware Software updates Encryption APT (Advanced Persistent Threat) Reusing passwords Hashing Penetration Testing Incident Response Personally identifiable information (PII) Spoofing Botnet Digital Certificate Trojan Cyber Hygiene Exploit Whale phishing Dark web Backdoor Threat Intelligence Data Loss Prevention (DLP) Malware Compliance Security Policy Worm Insider Threat Backups Training IDS (Intrusion Detection System) Phishing Spear phishing Vulnerability Honeypot Virus IPS (Intrusion Prevention System) Sandbox Zero- day Scareware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Intrusion
Awareness
Patch
Breach
Threat
Endpoint
Risk Assessment
Social Engineering
Threat Actor
Multi-factor authentication (MFA)
Cyberattack
Screen lock policy
Compromise
Ransomware
Software updates
Encryption
APT (Advanced Persistent Threat)
Reusing passwords
Hashing
Penetration Testing
Incident Response
Personally identifiable information (PII)
Spoofing
Botnet
Digital Certificate
Trojan
Cyber Hygiene
Exploit
Whale phishing
Dark web
Backdoor
Threat Intelligence
Data Loss Prevention (DLP)
Malware
Compliance
Security Policy
Worm
Insider Threat
Backups
Training
IDS (Intrusion Detection System)
Phishing
Spear phishing
Vulnerability
Honeypot
Virus
IPS (Intrusion Prevention System)
Sandbox
Zero-day
Scareware