Endpoint Threat Actor Vulnerability Spoofing Software updates Botnet Scareware Ransomware Training Security Policy Phishing Awareness Worm Cyber Hygiene Patch Trojan Breach Screen lock policy Virus Personally identifiable information (PII) IDS (Intrusion Detection System) Data Loss Prevention (DLP) Zero- day Digital Certificate Incident Response Threat Intelligence Social Engineering Honeypot Sandbox Dark web Spear phishing Compliance Encryption Backdoor Backups Intrusion Penetration Testing APT (Advanced Persistent Threat) Compromise IPS (Intrusion Prevention System) Hashing Insider Threat Reusing passwords Whale phishing Cyberattack Exploit Malware Risk Assessment Threat Multi-factor authentication (MFA) Endpoint Threat Actor Vulnerability Spoofing Software updates Botnet Scareware Ransomware Training Security Policy Phishing Awareness Worm Cyber Hygiene Patch Trojan Breach Screen lock policy Virus Personally identifiable information (PII) IDS (Intrusion Detection System) Data Loss Prevention (DLP) Zero- day Digital Certificate Incident Response Threat Intelligence Social Engineering Honeypot Sandbox Dark web Spear phishing Compliance Encryption Backdoor Backups Intrusion Penetration Testing APT (Advanced Persistent Threat) Compromise IPS (Intrusion Prevention System) Hashing Insider Threat Reusing passwords Whale phishing Cyberattack Exploit Malware Risk Assessment Threat Multi-factor authentication (MFA)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Endpoint
Threat Actor
Vulnerability
Spoofing
Software updates
Botnet
Scareware
Ransomware
Training
Security Policy
Phishing
Awareness
Worm
Cyber Hygiene
Patch
Trojan
Breach
Screen lock policy
Virus
Personally identifiable information (PII)
IDS (Intrusion Detection System)
Data Loss Prevention (DLP)
Zero-day
Digital Certificate
Incident Response
Threat Intelligence
Social Engineering
Honeypot
Sandbox
Dark web
Spear phishing
Compliance
Encryption
Backdoor
Backups
Intrusion
Penetration Testing
APT (Advanced Persistent Threat)
Compromise
IPS (Intrusion Prevention System)
Hashing
Insider Threat
Reusing passwords
Whale phishing
Cyberattack
Exploit
Malware
Risk Assessment
Threat
Multi-factor authentication (MFA)