Spoofing Breach IDS (Intrusion Detection System) Intrusion IPS (Intrusion Prevention System) Spear phishing Sandbox Threat Intelligence Cyber Hygiene Encryption Trojan APT (Advanced Persistent Threat) Training Software updates Malware Data Loss Prevention (DLP) Cyberattack Endpoint Reusing passwords Virus Scareware Worm Dark web Honeypot Botnet Penetration Testing Backups Compliance Screen lock policy Awareness Risk Assessment Personally identifiable information (PII) Vulnerability Patch Social Engineering Ransomware Exploit Multi-factor authentication (MFA) Digital Certificate Phishing Whale phishing Insider Threat Zero- day Backdoor Incident Response Hashing Threat Actor Threat Security Policy Compromise Spoofing Breach IDS (Intrusion Detection System) Intrusion IPS (Intrusion Prevention System) Spear phishing Sandbox Threat Intelligence Cyber Hygiene Encryption Trojan APT (Advanced Persistent Threat) Training Software updates Malware Data Loss Prevention (DLP) Cyberattack Endpoint Reusing passwords Virus Scareware Worm Dark web Honeypot Botnet Penetration Testing Backups Compliance Screen lock policy Awareness Risk Assessment Personally identifiable information (PII) Vulnerability Patch Social Engineering Ransomware Exploit Multi-factor authentication (MFA) Digital Certificate Phishing Whale phishing Insider Threat Zero- day Backdoor Incident Response Hashing Threat Actor Threat Security Policy Compromise
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Spoofing
Breach
IDS (Intrusion Detection System)
Intrusion
IPS (Intrusion Prevention System)
Spear phishing
Sandbox
Threat Intelligence
Cyber Hygiene
Encryption
Trojan
APT (Advanced Persistent Threat)
Training
Software updates
Malware
Data Loss Prevention (DLP)
Cyberattack
Endpoint
Reusing passwords
Virus
Scareware
Worm
Dark web
Honeypot
Botnet
Penetration Testing
Backups
Compliance
Screen lock policy
Awareness
Risk Assessment
Personally identifiable information (PII)
Vulnerability
Patch
Social Engineering
Ransomware
Exploit
Multi-factor authentication (MFA)
Digital Certificate
Phishing
Whale phishing
Insider Threat
Zero-day
Backdoor
Incident Response
Hashing
Threat Actor
Threat
Security Policy
Compromise