Botnet Virus Malware Security Policy Vulnerability Screen lock policy Data Loss Prevention (DLP) Awareness Penetration Testing Honeypot IDS (Intrusion Detection System) Threat Actor Training Cyberattack Sandbox Hashing Threat Ransomware Intrusion Trojan Compliance Exploit Insider Threat Personally identifiable information (PII) Spoofing Threat Intelligence Phishing APT (Advanced Persistent Threat) Risk Assessment Backups Patch Zero- day IPS (Intrusion Prevention System) Spear phishing Multi-factor authentication (MFA) Whale phishing Compromise Worm Breach Backdoor Encryption Incident Response Digital Certificate Cyber Hygiene Software updates Scareware Endpoint Reusing passwords Social Engineering Dark web Botnet Virus Malware Security Policy Vulnerability Screen lock policy Data Loss Prevention (DLP) Awareness Penetration Testing Honeypot IDS (Intrusion Detection System) Threat Actor Training Cyberattack Sandbox Hashing Threat Ransomware Intrusion Trojan Compliance Exploit Insider Threat Personally identifiable information (PII) Spoofing Threat Intelligence Phishing APT (Advanced Persistent Threat) Risk Assessment Backups Patch Zero- day IPS (Intrusion Prevention System) Spear phishing Multi-factor authentication (MFA) Whale phishing Compromise Worm Breach Backdoor Encryption Incident Response Digital Certificate Cyber Hygiene Software updates Scareware Endpoint Reusing passwords Social Engineering Dark web
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Botnet
Virus
Malware
Security Policy
Vulnerability
Screen lock policy
Data Loss Prevention (DLP)
Awareness
Penetration Testing
Honeypot
IDS (Intrusion Detection System)
Threat Actor
Training
Cyberattack
Sandbox
Hashing
Threat
Ransomware
Intrusion
Trojan
Compliance
Exploit
Insider Threat
Personally identifiable information (PII)
Spoofing
Threat Intelligence
Phishing
APT (Advanced Persistent Threat)
Risk Assessment
Backups
Patch
Zero-day
IPS (Intrusion Prevention System)
Spear phishing
Multi-factor authentication (MFA)
Whale phishing
Compromise
Worm
Breach
Backdoor
Encryption
Incident Response
Digital Certificate
Cyber Hygiene
Software updates
Scareware
Endpoint
Reusing passwords
Social Engineering
Dark web