IDS(IntrusionDetectionSystem)PhishingDigitalCertificateScreenlockpolicyBackupsSpearphishingTrojanMulti-factorauthentication(MFA)PatchThreatIntelligenceDarkwebRansomwarePersonallyidentifiableinformation(PII)EndpointThreatActorPenetrationTestingAPT(AdvancedPersistentThreat)HoneypotSecurityPolicySandboxCompromiseWormIncidentResponseEncryptionBotnetVulnerabilityRiskAssessmentInsiderThreatAwarenessThreatMalwareSocialEngineeringScarewareCyberHygieneTrainingHashingExploitSoftwareupdatesComplianceZero-dayCyberattackIntrusionIPS(IntrusionPreventionSystem)ReusingpasswordsBackdoorVirusWhalephishingSpoofingData LossPrevention(DLP)BreachIDS(IntrusionDetectionSystem)PhishingDigitalCertificateScreenlockpolicyBackupsSpearphishingTrojanMulti-factorauthentication(MFA)PatchThreatIntelligenceDarkwebRansomwarePersonallyidentifiableinformation(PII)EndpointThreatActorPenetrationTestingAPT(AdvancedPersistentThreat)HoneypotSecurityPolicySandboxCompromiseWormIncidentResponseEncryptionBotnetVulnerabilityRiskAssessmentInsiderThreatAwarenessThreatMalwareSocialEngineeringScarewareCyberHygieneTrainingHashingExploitSoftwareupdatesComplianceZero-dayCyberattackIntrusionIPS(IntrusionPreventionSystem)ReusingpasswordsBackdoorVirusWhalephishingSpoofingData LossPrevention(DLP)Breach

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. IDS (Intrusion Detection System)
  2. Phishing
  3. Digital Certificate
  4. Screen lock policy
  5. Backups
  6. Spear phishing
  7. Trojan
  8. Multi-factor authentication (MFA)
  9. Patch
  10. Threat Intelligence
  11. Dark web
  12. Ransomware
  13. Personally identifiable information (PII)
  14. Endpoint
  15. Threat Actor
  16. Penetration Testing
  17. APT (Advanced Persistent Threat)
  18. Honeypot
  19. Security Policy
  20. Sandbox
  21. Compromise
  22. Worm
  23. Incident Response
  24. Encryption
  25. Botnet
  26. Vulnerability
  27. Risk Assessment
  28. Insider Threat
  29. Awareness
  30. Threat
  31. Malware
  32. Social Engineering
  33. Scareware
  34. Cyber Hygiene
  35. Training
  36. Hashing
  37. Exploit
  38. Software updates
  39. Compliance
  40. Zero-day
  41. Cyberattack
  42. Intrusion
  43. IPS (Intrusion Prevention System)
  44. Reusing passwords
  45. Backdoor
  46. Virus
  47. Whale phishing
  48. Spoofing
  49. Data Loss Prevention (DLP)
  50. Breach