Worm Intrusion Awareness Threat Actor Personally identifiable information (PII) Breach Cyberattack Endpoint Ransomware Encryption Phishing IPS (Intrusion Prevention System) Dark web Spoofing Virus Screen lock policy Reusing passwords Backdoor Insider Threat Cyber Hygiene Incident Response Penetration Testing Training Compliance APT (Advanced Persistent Threat) Data Loss Prevention (DLP) Digital Certificate Hashing Spear phishing Multi-factor authentication (MFA) Software updates Compromise Backups Botnet Exploit IDS (Intrusion Detection System) Risk Assessment Social Engineering Honeypot Trojan Patch Scareware Sandbox Threat Intelligence Malware Whale phishing Zero- day Vulnerability Security Policy Threat Worm Intrusion Awareness Threat Actor Personally identifiable information (PII) Breach Cyberattack Endpoint Ransomware Encryption Phishing IPS (Intrusion Prevention System) Dark web Spoofing Virus Screen lock policy Reusing passwords Backdoor Insider Threat Cyber Hygiene Incident Response Penetration Testing Training Compliance APT (Advanced Persistent Threat) Data Loss Prevention (DLP) Digital Certificate Hashing Spear phishing Multi-factor authentication (MFA) Software updates Compromise Backups Botnet Exploit IDS (Intrusion Detection System) Risk Assessment Social Engineering Honeypot Trojan Patch Scareware Sandbox Threat Intelligence Malware Whale phishing Zero- day Vulnerability Security Policy Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Worm
Intrusion
Awareness
Threat Actor
Personally identifiable information (PII)
Breach
Cyberattack
Endpoint
Ransomware
Encryption
Phishing
IPS (Intrusion Prevention System)
Dark web
Spoofing
Virus
Screen lock policy
Reusing passwords
Backdoor
Insider Threat
Cyber Hygiene
Incident Response
Penetration Testing
Training
Compliance
APT (Advanced Persistent Threat)
Data Loss Prevention (DLP)
Digital Certificate
Hashing
Spear phishing
Multi-factor authentication (MFA)
Software updates
Compromise
Backups
Botnet
Exploit
IDS (Intrusion Detection System)
Risk Assessment
Social Engineering
Honeypot
Trojan
Patch
Scareware
Sandbox
Threat Intelligence
Malware
Whale phishing
Zero-day
Vulnerability
Security Policy
Threat