Social Engineering Backups Incident Response Risk Assessment Compromise Endpoint Virus Worm Screen lock policy Spoofing Intrusion APT (Advanced Persistent Threat) Backdoor Software updates Training Honeypot Breach Patch Trojan Awareness Vulnerability Hashing Personally identifiable information (PII) Threat Cyber Hygiene Encryption Phishing IDS (Intrusion Detection System) Threat Intelligence Compliance Zero- day Digital Certificate Penetration Testing Ransomware Threat Actor Scareware Spear phishing Whale phishing Data Loss Prevention (DLP) Sandbox Cyberattack Security Policy Botnet Malware Reusing passwords Dark web Exploit IPS (Intrusion Prevention System) Multi-factor authentication (MFA) Insider Threat Social Engineering Backups Incident Response Risk Assessment Compromise Endpoint Virus Worm Screen lock policy Spoofing Intrusion APT (Advanced Persistent Threat) Backdoor Software updates Training Honeypot Breach Patch Trojan Awareness Vulnerability Hashing Personally identifiable information (PII) Threat Cyber Hygiene Encryption Phishing IDS (Intrusion Detection System) Threat Intelligence Compliance Zero- day Digital Certificate Penetration Testing Ransomware Threat Actor Scareware Spear phishing Whale phishing Data Loss Prevention (DLP) Sandbox Cyberattack Security Policy Botnet Malware Reusing passwords Dark web Exploit IPS (Intrusion Prevention System) Multi-factor authentication (MFA) Insider Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Social Engineering
Backups
Incident Response
Risk Assessment
Compromise
Endpoint
Virus
Worm
Screen lock policy
Spoofing
Intrusion
APT (Advanced Persistent Threat)
Backdoor
Software updates
Training
Honeypot
Breach
Patch
Trojan
Awareness
Vulnerability
Hashing
Personally identifiable information (PII)
Threat
Cyber Hygiene
Encryption
Phishing
IDS (Intrusion Detection System)
Threat Intelligence
Compliance
Zero-day
Digital Certificate
Penetration Testing
Ransomware
Threat Actor
Scareware
Spear phishing
Whale phishing
Data Loss Prevention (DLP)
Sandbox
Cyberattack
Security Policy
Botnet
Malware
Reusing passwords
Dark web
Exploit
IPS (Intrusion Prevention System)
Multi-factor authentication (MFA)
Insider Threat