SpoofingBreachIDS(IntrusionDetectionSystem)IntrusionIPS(IntrusionPreventionSystem)SpearphishingSandboxThreatIntelligenceCyberHygieneEncryptionTrojanAPT(AdvancedPersistentThreat)TrainingSoftwareupdatesMalwareData LossPrevention(DLP)CyberattackEndpointReusingpasswordsVirusScarewareWormDarkwebHoneypotBotnetPenetrationTestingBackupsComplianceScreenlockpolicyAwarenessRiskAssessmentPersonallyidentifiableinformation(PII)VulnerabilityPatchSocialEngineeringRansomwareExploitMulti-factorauthentication(MFA)DigitalCertificatePhishingWhalephishingInsiderThreatZero-dayBackdoorIncidentResponseHashingThreatActorThreatSecurityPolicyCompromiseSpoofingBreachIDS(IntrusionDetectionSystem)IntrusionIPS(IntrusionPreventionSystem)SpearphishingSandboxThreatIntelligenceCyberHygieneEncryptionTrojanAPT(AdvancedPersistentThreat)TrainingSoftwareupdatesMalwareData LossPrevention(DLP)CyberattackEndpointReusingpasswordsVirusScarewareWormDarkwebHoneypotBotnetPenetrationTestingBackupsComplianceScreenlockpolicyAwarenessRiskAssessmentPersonallyidentifiableinformation(PII)VulnerabilityPatchSocialEngineeringRansomwareExploitMulti-factorauthentication(MFA)DigitalCertificatePhishingWhalephishingInsiderThreatZero-dayBackdoorIncidentResponseHashingThreatActorThreatSecurityPolicyCompromise

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Spoofing
  2. Breach
  3. IDS (Intrusion Detection System)
  4. Intrusion
  5. IPS (Intrusion Prevention System)
  6. Spear phishing
  7. Sandbox
  8. Threat Intelligence
  9. Cyber Hygiene
  10. Encryption
  11. Trojan
  12. APT (Advanced Persistent Threat)
  13. Training
  14. Software updates
  15. Malware
  16. Data Loss Prevention (DLP)
  17. Cyberattack
  18. Endpoint
  19. Reusing passwords
  20. Virus
  21. Scareware
  22. Worm
  23. Dark web
  24. Honeypot
  25. Botnet
  26. Penetration Testing
  27. Backups
  28. Compliance
  29. Screen lock policy
  30. Awareness
  31. Risk Assessment
  32. Personally identifiable information (PII)
  33. Vulnerability
  34. Patch
  35. Social Engineering
  36. Ransomware
  37. Exploit
  38. Multi-factor authentication (MFA)
  39. Digital Certificate
  40. Phishing
  41. Whale phishing
  42. Insider Threat
  43. Zero-day
  44. Backdoor
  45. Incident Response
  46. Hashing
  47. Threat Actor
  48. Threat
  49. Security Policy
  50. Compromise