Threat Intelligence Incident Response Ransomware Scareware Cyber Hygiene Screen lock policy IPS (Intrusion Prevention System) Exploit Reusing passwords Spoofing Awareness APT (Advanced Persistent Threat) Dark web Compromise Security Policy Multi-factor authentication (MFA) Malware Spear phishing Hashing Digital Certificate Vulnerability Insider Threat Threat Zero- day Patch IDS (Intrusion Detection System) Phishing Cyberattack Worm Endpoint Botnet Intrusion Trojan Software updates Training Threat Actor Compliance Backups Risk Assessment Data Loss Prevention (DLP) Encryption Backdoor Virus Sandbox Breach Social Engineering Penetration Testing Personally identifiable information (PII) Whale phishing Honeypot Threat Intelligence Incident Response Ransomware Scareware Cyber Hygiene Screen lock policy IPS (Intrusion Prevention System) Exploit Reusing passwords Spoofing Awareness APT (Advanced Persistent Threat) Dark web Compromise Security Policy Multi-factor authentication (MFA) Malware Spear phishing Hashing Digital Certificate Vulnerability Insider Threat Threat Zero- day Patch IDS (Intrusion Detection System) Phishing Cyberattack Worm Endpoint Botnet Intrusion Trojan Software updates Training Threat Actor Compliance Backups Risk Assessment Data Loss Prevention (DLP) Encryption Backdoor Virus Sandbox Breach Social Engineering Penetration Testing Personally identifiable information (PII) Whale phishing Honeypot
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat Intelligence
Incident Response
Ransomware
Scareware
Cyber Hygiene
Screen lock policy
IPS (Intrusion Prevention System)
Exploit
Reusing passwords
Spoofing
Awareness
APT (Advanced Persistent Threat)
Dark web
Compromise
Security Policy
Multi-factor authentication (MFA)
Malware
Spear phishing
Hashing
Digital Certificate
Vulnerability
Insider Threat
Threat
Zero-day
Patch
IDS (Intrusion Detection System)
Phishing
Cyberattack
Worm
Endpoint
Botnet
Intrusion
Trojan
Software updates
Training
Threat Actor
Compliance
Backups
Risk Assessment
Data Loss Prevention (DLP)
Encryption
Backdoor
Virus
Sandbox
Breach
Social Engineering
Penetration Testing
Personally identifiable information (PII)
Whale phishing
Honeypot