Virus Whale phishing IDS (Intrusion Detection System) Threat Actor Zero- day Scareware Malware Endpoint Spear phishing Training Intrusion Threat Intelligence Threat Phishing Compromise Backups Worm IPS (Intrusion Prevention System) Social Engineering Botnet Vulnerability Encryption Ransomware Awareness Risk Assessment Security Policy Screen lock policy Patch Insider Threat Personally identifiable information (PII) Digital Certificate Backdoor Software updates Data Loss Prevention (DLP) Exploit Sandbox Honeypot Spoofing Hashing Penetration Testing Compliance Cyber Hygiene Breach APT (Advanced Persistent Threat) Multi-factor authentication (MFA) Trojan Cyberattack Incident Response Reusing passwords Dark web Virus Whale phishing IDS (Intrusion Detection System) Threat Actor Zero- day Scareware Malware Endpoint Spear phishing Training Intrusion Threat Intelligence Threat Phishing Compromise Backups Worm IPS (Intrusion Prevention System) Social Engineering Botnet Vulnerability Encryption Ransomware Awareness Risk Assessment Security Policy Screen lock policy Patch Insider Threat Personally identifiable information (PII) Digital Certificate Backdoor Software updates Data Loss Prevention (DLP) Exploit Sandbox Honeypot Spoofing Hashing Penetration Testing Compliance Cyber Hygiene Breach APT (Advanced Persistent Threat) Multi-factor authentication (MFA) Trojan Cyberattack Incident Response Reusing passwords Dark web
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Virus
Whale phishing
IDS (Intrusion Detection System)
Threat Actor
Zero-day
Scareware
Malware
Endpoint
Spear phishing
Training
Intrusion
Threat Intelligence
Threat
Phishing
Compromise
Backups
Worm
IPS (Intrusion Prevention System)
Social Engineering
Botnet
Vulnerability
Encryption
Ransomware
Awareness
Risk Assessment
Security Policy
Screen lock policy
Patch
Insider Threat
Personally identifiable information (PII)
Digital Certificate
Backdoor
Software updates
Data Loss Prevention (DLP)
Exploit
Sandbox
Honeypot
Spoofing
Hashing
Penetration Testing
Compliance
Cyber Hygiene
Breach
APT (Advanced Persistent Threat)
Multi-factor authentication (MFA)
Trojan
Cyberattack
Incident Response
Reusing passwords
Dark web