Multi-factor authentication (MFA) Trojan Threat Intelligence Sandbox Virus Reusing passwords Worm Honeypot Data Loss Prevention (DLP) Whale phishing Risk Assessment Patch Incident Response Phishing Backdoor Endpoint Threat Exploit Insider Threat Security Policy IDS (Intrusion Detection System) Training Backups Botnet Zero- day Software updates Malware Personally identifiable information (PII) Awareness Hashing Vulnerability Cyber Hygiene Compromise Ransomware Penetration Testing Dark web Encryption Intrusion APT (Advanced Persistent Threat) Digital Certificate Screen lock policy Spear phishing Spoofing IPS (Intrusion Prevention System) Social Engineering Cyberattack Threat Actor Scareware Breach Compliance Multi-factor authentication (MFA) Trojan Threat Intelligence Sandbox Virus Reusing passwords Worm Honeypot Data Loss Prevention (DLP) Whale phishing Risk Assessment Patch Incident Response Phishing Backdoor Endpoint Threat Exploit Insider Threat Security Policy IDS (Intrusion Detection System) Training Backups Botnet Zero- day Software updates Malware Personally identifiable information (PII) Awareness Hashing Vulnerability Cyber Hygiene Compromise Ransomware Penetration Testing Dark web Encryption Intrusion APT (Advanced Persistent Threat) Digital Certificate Screen lock policy Spear phishing Spoofing IPS (Intrusion Prevention System) Social Engineering Cyberattack Threat Actor Scareware Breach Compliance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Multi-factor authentication (MFA)
Trojan
Threat Intelligence
Sandbox
Virus
Reusing passwords
Worm
Honeypot
Data Loss Prevention (DLP)
Whale phishing
Risk Assessment
Patch
Incident Response
Phishing
Backdoor
Endpoint
Threat
Exploit
Insider Threat
Security Policy
IDS (Intrusion Detection System)
Training
Backups
Botnet
Zero-day
Software updates
Malware
Personally identifiable information (PII)
Awareness
Hashing
Vulnerability
Cyber Hygiene
Compromise
Ransomware
Penetration Testing
Dark web
Encryption
Intrusion
APT (Advanced Persistent Threat)
Digital Certificate
Screen lock policy
Spear phishing
Spoofing
IPS (Intrusion Prevention System)
Social Engineering
Cyberattack
Threat Actor
Scareware
Breach
Compliance