Threat Exploit Risk Assessment Ransomware Scareware Awareness Cyberattack Sandbox Digital Certificate Honeypot Compromise Security Policy Multi-factor authentication (MFA) Whale phishing Dark web Malware Encryption Backups IDS (Intrusion Detection System) Penetration Testing Breach Spoofing Training Reusing passwords Intrusion APT (Advanced Persistent Threat) Social Engineering Vulnerability Endpoint Backdoor Phishing Data Loss Prevention (DLP) Software updates Patch IPS (Intrusion Prevention System) Hashing Screen lock policy Botnet Incident Response Worm Threat Intelligence Personally identifiable information (PII) Compliance Threat Actor Spear phishing Insider Threat Virus Trojan Cyber Hygiene Zero- day Threat Exploit Risk Assessment Ransomware Scareware Awareness Cyberattack Sandbox Digital Certificate Honeypot Compromise Security Policy Multi-factor authentication (MFA) Whale phishing Dark web Malware Encryption Backups IDS (Intrusion Detection System) Penetration Testing Breach Spoofing Training Reusing passwords Intrusion APT (Advanced Persistent Threat) Social Engineering Vulnerability Endpoint Backdoor Phishing Data Loss Prevention (DLP) Software updates Patch IPS (Intrusion Prevention System) Hashing Screen lock policy Botnet Incident Response Worm Threat Intelligence Personally identifiable information (PII) Compliance Threat Actor Spear phishing Insider Threat Virus Trojan Cyber Hygiene Zero- day
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat
Exploit
Risk Assessment
Ransomware
Scareware
Awareness
Cyberattack
Sandbox
Digital Certificate
Honeypot
Compromise
Security Policy
Multi-factor authentication (MFA)
Whale phishing
Dark web
Malware
Encryption
Backups
IDS (Intrusion Detection System)
Penetration Testing
Breach
Spoofing
Training
Reusing passwords
Intrusion
APT (Advanced Persistent Threat)
Social Engineering
Vulnerability
Endpoint
Backdoor
Phishing
Data Loss Prevention (DLP)
Software updates
Patch
IPS (Intrusion Prevention System)
Hashing
Screen lock policy
Botnet
Incident Response
Worm
Threat Intelligence
Personally identifiable information (PII)
Compliance
Threat Actor
Spear phishing
Insider Threat
Virus
Trojan
Cyber Hygiene
Zero-day