Threat Intelligence Intrusion APT (Advanced Persistent Threat) Cyberattack Backdoor Multi-factor authentication (MFA) Worm Software updates Scareware Malware Social Engineering Backups Trojan Screen lock policy Hashing Digital Certificate Dark web Patch Sandbox Training Security Policy Zero- day Insider Threat Compliance Cyber Hygiene Incident Response Exploit Phishing Honeypot Data Loss Prevention (DLP) Reusing passwords Breach Encryption Whale phishing Vulnerability Spoofing Virus Threat IPS (Intrusion Prevention System) Awareness Botnet IDS (Intrusion Detection System) Ransomware Threat Actor Personally identifiable information (PII) Endpoint Compromise Risk Assessment Penetration Testing Spear phishing Threat Intelligence Intrusion APT (Advanced Persistent Threat) Cyberattack Backdoor Multi-factor authentication (MFA) Worm Software updates Scareware Malware Social Engineering Backups Trojan Screen lock policy Hashing Digital Certificate Dark web Patch Sandbox Training Security Policy Zero- day Insider Threat Compliance Cyber Hygiene Incident Response Exploit Phishing Honeypot Data Loss Prevention (DLP) Reusing passwords Breach Encryption Whale phishing Vulnerability Spoofing Virus Threat IPS (Intrusion Prevention System) Awareness Botnet IDS (Intrusion Detection System) Ransomware Threat Actor Personally identifiable information (PII) Endpoint Compromise Risk Assessment Penetration Testing Spear phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat Intelligence
Intrusion
APT (Advanced Persistent Threat)
Cyberattack
Backdoor
Multi-factor authentication (MFA)
Worm
Software updates
Scareware
Malware
Social Engineering
Backups
Trojan
Screen lock policy
Hashing
Digital Certificate
Dark web
Patch
Sandbox
Training
Security Policy
Zero-day
Insider Threat
Compliance
Cyber Hygiene
Incident Response
Exploit
Phishing
Honeypot
Data Loss Prevention (DLP)
Reusing passwords
Breach
Encryption
Whale phishing
Vulnerability
Spoofing
Virus
Threat
IPS (Intrusion Prevention System)
Awareness
Botnet
IDS (Intrusion Detection System)
Ransomware
Threat Actor
Personally identifiable information (PII)
Endpoint
Compromise
Risk Assessment
Penetration Testing
Spear phishing