Digital Certificate Spoofing Malware Cyberattack Worm Data Loss Prevention (DLP) Software updates Training Personally identifiable information (PII) Honeypot Reusing passwords Threat Intelligence Hashing Ransomware Threat Backups Scareware Compliance Breach Social Engineering Phishing Virus Penetration Testing Spear phishing Dark web Cyber Hygiene Incident Response Zero- day Patch Backdoor IPS (Intrusion Prevention System) Botnet Risk Assessment APT (Advanced Persistent Threat) Trojan IDS (Intrusion Detection System) Screen lock policy Awareness Sandbox Multi-factor authentication (MFA) Compromise Threat Actor Intrusion Vulnerability Encryption Endpoint Whale phishing Exploit Insider Threat Security Policy Digital Certificate Spoofing Malware Cyberattack Worm Data Loss Prevention (DLP) Software updates Training Personally identifiable information (PII) Honeypot Reusing passwords Threat Intelligence Hashing Ransomware Threat Backups Scareware Compliance Breach Social Engineering Phishing Virus Penetration Testing Spear phishing Dark web Cyber Hygiene Incident Response Zero- day Patch Backdoor IPS (Intrusion Prevention System) Botnet Risk Assessment APT (Advanced Persistent Threat) Trojan IDS (Intrusion Detection System) Screen lock policy Awareness Sandbox Multi-factor authentication (MFA) Compromise Threat Actor Intrusion Vulnerability Encryption Endpoint Whale phishing Exploit Insider Threat Security Policy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Digital Certificate
Spoofing
Malware
Cyberattack
Worm
Data Loss Prevention (DLP)
Software updates
Training
Personally identifiable information (PII)
Honeypot
Reusing passwords
Threat Intelligence
Hashing
Ransomware
Threat
Backups
Scareware
Compliance
Breach
Social Engineering
Phishing
Virus
Penetration Testing
Spear phishing
Dark web
Cyber Hygiene
Incident Response
Zero-day
Patch
Backdoor
IPS (Intrusion Prevention System)
Botnet
Risk Assessment
APT (Advanced Persistent Threat)
Trojan
IDS (Intrusion Detection System)
Screen lock policy
Awareness
Sandbox
Multi-factor authentication (MFA)
Compromise
Threat Actor
Intrusion
Vulnerability
Encryption
Endpoint
Whale phishing
Exploit
Insider Threat
Security Policy