Backdoor Patch Whale phishing Social Engineering Compromise IPS (Intrusion Prevention System) Awareness Cyber Hygiene Breach Phishing Zero- day Training Reusing passwords Incident Response Spear phishing Digital Certificate Risk Assessment Personally identifiable information (PII) Insider Threat Threat Worm Exploit Security Policy Multi-factor authentication (MFA) Malware Threat Intelligence Encryption Data Loss Prevention (DLP) IDS (Intrusion Detection System) Spoofing Compliance Honeypot Botnet Cyberattack Vulnerability Screen lock policy Dark web Sandbox Hashing Threat Actor Endpoint Ransomware Intrusion Penetration Testing Scareware Backups Virus Trojan Software updates APT (Advanced Persistent Threat) Backdoor Patch Whale phishing Social Engineering Compromise IPS (Intrusion Prevention System) Awareness Cyber Hygiene Breach Phishing Zero- day Training Reusing passwords Incident Response Spear phishing Digital Certificate Risk Assessment Personally identifiable information (PII) Insider Threat Threat Worm Exploit Security Policy Multi-factor authentication (MFA) Malware Threat Intelligence Encryption Data Loss Prevention (DLP) IDS (Intrusion Detection System) Spoofing Compliance Honeypot Botnet Cyberattack Vulnerability Screen lock policy Dark web Sandbox Hashing Threat Actor Endpoint Ransomware Intrusion Penetration Testing Scareware Backups Virus Trojan Software updates APT (Advanced Persistent Threat)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Backdoor
Patch
Whale phishing
Social Engineering
Compromise
IPS (Intrusion Prevention System)
Awareness
Cyber Hygiene
Breach
Phishing
Zero-day
Training
Reusing passwords
Incident Response
Spear phishing
Digital Certificate
Risk Assessment
Personally identifiable information (PII)
Insider Threat
Threat
Worm
Exploit
Security Policy
Multi-factor authentication (MFA)
Malware
Threat Intelligence
Encryption
Data Loss Prevention (DLP)
IDS (Intrusion Detection System)
Spoofing
Compliance
Honeypot
Botnet
Cyberattack
Vulnerability
Screen lock policy
Dark web
Sandbox
Hashing
Threat Actor
Endpoint
Ransomware
Intrusion
Penetration Testing
Scareware
Backups
Virus
Trojan
Software updates
APT (Advanced Persistent Threat)