Backdoor Data Loss Prevention (DLP) IPS (Intrusion Prevention System) Honeypot Dark web Compromise Breach Threat Actor Reusing passwords Encryption APT (Advanced Persistent Threat) Patch Hashing IDS (Intrusion Detection System) Zero- day Insider Threat Trojan Endpoint Vulnerability Training Risk Assessment Cyber Hygiene Compliance Personally identifiable information (PII) Malware Threat Exploit Backups Screen lock policy Penetration Testing Social Engineering Spear phishing Phishing Digital Certificate Incident Response Awareness Intrusion Software updates Threat Intelligence Sandbox Spoofing Worm Cyberattack Virus Multi-factor authentication (MFA) Botnet Ransomware Security Policy Scareware Whale phishing Backdoor Data Loss Prevention (DLP) IPS (Intrusion Prevention System) Honeypot Dark web Compromise Breach Threat Actor Reusing passwords Encryption APT (Advanced Persistent Threat) Patch Hashing IDS (Intrusion Detection System) Zero- day Insider Threat Trojan Endpoint Vulnerability Training Risk Assessment Cyber Hygiene Compliance Personally identifiable information (PII) Malware Threat Exploit Backups Screen lock policy Penetration Testing Social Engineering Spear phishing Phishing Digital Certificate Incident Response Awareness Intrusion Software updates Threat Intelligence Sandbox Spoofing Worm Cyberattack Virus Multi-factor authentication (MFA) Botnet Ransomware Security Policy Scareware Whale phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Backdoor
Data Loss Prevention (DLP)
IPS (Intrusion Prevention System)
Honeypot
Dark web
Compromise
Breach
Threat Actor
Reusing passwords
Encryption
APT (Advanced Persistent Threat)
Patch
Hashing
IDS (Intrusion Detection System)
Zero-day
Insider Threat
Trojan
Endpoint
Vulnerability
Training
Risk Assessment
Cyber Hygiene
Compliance
Personally identifiable information (PII)
Malware
Threat
Exploit
Backups
Screen lock policy
Penetration Testing
Social Engineering
Spear phishing
Phishing
Digital Certificate
Incident Response
Awareness
Intrusion
Software updates
Threat Intelligence
Sandbox
Spoofing
Worm
Cyberattack
Virus
Multi-factor authentication (MFA)
Botnet
Ransomware
Security Policy
Scareware
Whale phishing