Backdoor Threat IDS (Intrusion Detection System) Sandbox Encryption Honeypot Scareware Zero- day Insider Threat Endpoint Virus Vulnerability Spear phishing Spoofing Security Policy Exploit Breach Botnet Dark web Threat Intelligence Intrusion Penetration Testing Hashing Screen lock policy Personally identifiable information (PII) Compromise APT (Advanced Persistent Threat) Whale phishing Cyberattack Social Engineering Risk Assessment Multi-factor authentication (MFA) Data Loss Prevention (DLP) Software updates Phishing Training Patch Incident Response Compliance Threat Actor IPS (Intrusion Prevention System) Digital Certificate Reusing passwords Trojan Cyber Hygiene Malware Worm Backups Ransomware Awareness Backdoor Threat IDS (Intrusion Detection System) Sandbox Encryption Honeypot Scareware Zero- day Insider Threat Endpoint Virus Vulnerability Spear phishing Spoofing Security Policy Exploit Breach Botnet Dark web Threat Intelligence Intrusion Penetration Testing Hashing Screen lock policy Personally identifiable information (PII) Compromise APT (Advanced Persistent Threat) Whale phishing Cyberattack Social Engineering Risk Assessment Multi-factor authentication (MFA) Data Loss Prevention (DLP) Software updates Phishing Training Patch Incident Response Compliance Threat Actor IPS (Intrusion Prevention System) Digital Certificate Reusing passwords Trojan Cyber Hygiene Malware Worm Backups Ransomware Awareness
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Backdoor
Threat
IDS (Intrusion Detection System)
Sandbox
Encryption
Honeypot
Scareware
Zero-day
Insider Threat
Endpoint
Virus
Vulnerability
Spear phishing
Spoofing
Security Policy
Exploit
Breach
Botnet
Dark web
Threat Intelligence
Intrusion
Penetration Testing
Hashing
Screen lock policy
Personally identifiable information (PII)
Compromise
APT (Advanced Persistent Threat)
Whale phishing
Cyberattack
Social Engineering
Risk Assessment
Multi-factor authentication (MFA)
Data Loss Prevention (DLP)
Software updates
Phishing
Training
Patch
Incident Response
Compliance
Threat Actor
IPS (Intrusion Prevention System)
Digital Certificate
Reusing passwords
Trojan
Cyber Hygiene
Malware
Worm
Backups
Ransomware
Awareness