Cyber Hygiene Botnet Hashing Whale phishing Training Awareness Threat Backups Digital Certificate Worm Ransomware Encryption APT (Advanced Persistent Threat) Screen lock policy Trojan Honeypot Phishing Exploit Insider Threat Threat Actor Scareware Spear phishing Dark web Breach Vulnerability Compromise Intrusion Cyberattack Malware Threat Intelligence Compliance Spoofing IPS (Intrusion Prevention System) Patch Endpoint Security Policy Zero- day Sandbox Penetration Testing Software updates Risk Assessment Reusing passwords Incident Response Personally identifiable information (PII) Multi-factor authentication (MFA) Backdoor Virus IDS (Intrusion Detection System) Social Engineering Data Loss Prevention (DLP) Cyber Hygiene Botnet Hashing Whale phishing Training Awareness Threat Backups Digital Certificate Worm Ransomware Encryption APT (Advanced Persistent Threat) Screen lock policy Trojan Honeypot Phishing Exploit Insider Threat Threat Actor Scareware Spear phishing Dark web Breach Vulnerability Compromise Intrusion Cyberattack Malware Threat Intelligence Compliance Spoofing IPS (Intrusion Prevention System) Patch Endpoint Security Policy Zero- day Sandbox Penetration Testing Software updates Risk Assessment Reusing passwords Incident Response Personally identifiable information (PII) Multi-factor authentication (MFA) Backdoor Virus IDS (Intrusion Detection System) Social Engineering Data Loss Prevention (DLP)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyber Hygiene
Botnet
Hashing
Whale phishing
Training
Awareness
Threat
Backups
Digital Certificate
Worm
Ransomware
Encryption
APT (Advanced Persistent Threat)
Screen lock policy
Trojan
Honeypot
Phishing
Exploit
Insider Threat
Threat Actor
Scareware
Spear phishing
Dark web
Breach
Vulnerability
Compromise
Intrusion
Cyberattack
Malware
Threat Intelligence
Compliance
Spoofing
IPS (Intrusion Prevention System)
Patch
Endpoint
Security Policy
Zero-day
Sandbox
Penetration Testing
Software updates
Risk Assessment
Reusing passwords
Incident Response
Personally identifiable information (PII)
Multi-factor authentication (MFA)
Backdoor
Virus
IDS (Intrusion Detection System)
Social Engineering
Data Loss Prevention (DLP)