VirusWhalephishingIDS(IntrusionDetectionSystem)ThreatActorZero-dayScarewareMalwareEndpointSpearphishingTrainingIntrusionThreatIntelligenceThreatPhishingCompromiseBackupsWormIPS(IntrusionPreventionSystem)SocialEngineeringBotnetVulnerabilityEncryptionRansomwareAwarenessRiskAssessmentSecurityPolicyScreenlockpolicyPatchInsiderThreatPersonallyidentifiableinformation(PII)DigitalCertificateBackdoorSoftwareupdatesData LossPrevention(DLP)ExploitSandboxHoneypotSpoofingHashingPenetrationTestingComplianceCyberHygieneBreachAPT(AdvancedPersistentThreat)Multi-factorauthentication(MFA)TrojanCyberattackIncidentResponseReusingpasswordsDarkwebVirusWhalephishingIDS(IntrusionDetectionSystem)ThreatActorZero-dayScarewareMalwareEndpointSpearphishingTrainingIntrusionThreatIntelligenceThreatPhishingCompromiseBackupsWormIPS(IntrusionPreventionSystem)SocialEngineeringBotnetVulnerabilityEncryptionRansomwareAwarenessRiskAssessmentSecurityPolicyScreenlockpolicyPatchInsiderThreatPersonallyidentifiableinformation(PII)DigitalCertificateBackdoorSoftwareupdatesData LossPrevention(DLP)ExploitSandboxHoneypotSpoofingHashingPenetrationTestingComplianceCyberHygieneBreachAPT(AdvancedPersistentThreat)Multi-factorauthentication(MFA)TrojanCyberattackIncidentResponseReusingpasswordsDarkweb

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Virus
  2. Whale phishing
  3. IDS (Intrusion Detection System)
  4. Threat Actor
  5. Zero-day
  6. Scareware
  7. Malware
  8. Endpoint
  9. Spear phishing
  10. Training
  11. Intrusion
  12. Threat Intelligence
  13. Threat
  14. Phishing
  15. Compromise
  16. Backups
  17. Worm
  18. IPS (Intrusion Prevention System)
  19. Social Engineering
  20. Botnet
  21. Vulnerability
  22. Encryption
  23. Ransomware
  24. Awareness
  25. Risk Assessment
  26. Security Policy
  27. Screen lock policy
  28. Patch
  29. Insider Threat
  30. Personally identifiable information (PII)
  31. Digital Certificate
  32. Backdoor
  33. Software updates
  34. Data Loss Prevention (DLP)
  35. Exploit
  36. Sandbox
  37. Honeypot
  38. Spoofing
  39. Hashing
  40. Penetration Testing
  41. Compliance
  42. Cyber Hygiene
  43. Breach
  44. APT (Advanced Persistent Threat)
  45. Multi-factor authentication (MFA)
  46. Trojan
  47. Cyberattack
  48. Incident Response
  49. Reusing passwords
  50. Dark web