Compliance Compromise Personally identifiable information (PII) Whale phishing Awareness Ransomware Scareware Vulnerability Risk Assessment Trojan IPS (Intrusion Prevention System) Sandbox Botnet Worm Spoofing Virus Digital Certificate Backups Honeypot Training Spear phishing Dark web Incident Response Threat Actor Malware Cyber Hygiene Security Policy Threat Social Engineering APT (Advanced Persistent Threat) Software updates Breach Phishing Endpoint Penetration Testing Insider Threat Exploit Reusing passwords Intrusion Cyberattack Hashing Encryption Multi-factor authentication (MFA) Data Loss Prevention (DLP) IDS (Intrusion Detection System) Backdoor Threat Intelligence Patch Screen lock policy Zero- day Compliance Compromise Personally identifiable information (PII) Whale phishing Awareness Ransomware Scareware Vulnerability Risk Assessment Trojan IPS (Intrusion Prevention System) Sandbox Botnet Worm Spoofing Virus Digital Certificate Backups Honeypot Training Spear phishing Dark web Incident Response Threat Actor Malware Cyber Hygiene Security Policy Threat Social Engineering APT (Advanced Persistent Threat) Software updates Breach Phishing Endpoint Penetration Testing Insider Threat Exploit Reusing passwords Intrusion Cyberattack Hashing Encryption Multi-factor authentication (MFA) Data Loss Prevention (DLP) IDS (Intrusion Detection System) Backdoor Threat Intelligence Patch Screen lock policy Zero- day
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Compliance
Compromise
Personally identifiable information (PII)
Whale phishing
Awareness
Ransomware
Scareware
Vulnerability
Risk Assessment
Trojan
IPS (Intrusion Prevention System)
Sandbox
Botnet
Worm
Spoofing
Virus
Digital Certificate
Backups
Honeypot
Training
Spear phishing
Dark web
Incident Response
Threat Actor
Malware
Cyber Hygiene
Security Policy
Threat
Social Engineering
APT (Advanced Persistent Threat)
Software updates
Breach
Phishing
Endpoint
Penetration Testing
Insider Threat
Exploit
Reusing passwords
Intrusion
Cyberattack
Hashing
Encryption
Multi-factor authentication (MFA)
Data Loss Prevention (DLP)
IDS (Intrusion Detection System)
Backdoor
Threat Intelligence
Patch
Screen lock policy
Zero-day