APT (Advanced Persistent Threat) Dark web Threat Actor Spoofing IDS (Intrusion Detection System) Sandbox Phishing Digital Certificate Trojan Botnet Data Loss Prevention (DLP) Insider Threat Training Exploit Spear phishing Threat Intelligence IPS (Intrusion Prevention System) Backdoor Risk Assessment Hashing Cyberattack Threat Virus Encryption Compliance Patch Cyber Hygiene Personally identifiable information (PII) Reusing passwords Malware Intrusion Social Engineering Penetration Testing Worm Backups Security Policy Software updates Ransomware Vulnerability Multi-factor authentication (MFA) Compromise Breach Whale phishing Awareness Scareware Incident Response Zero- day Endpoint Screen lock policy Honeypot APT (Advanced Persistent Threat) Dark web Threat Actor Spoofing IDS (Intrusion Detection System) Sandbox Phishing Digital Certificate Trojan Botnet Data Loss Prevention (DLP) Insider Threat Training Exploit Spear phishing Threat Intelligence IPS (Intrusion Prevention System) Backdoor Risk Assessment Hashing Cyberattack Threat Virus Encryption Compliance Patch Cyber Hygiene Personally identifiable information (PII) Reusing passwords Malware Intrusion Social Engineering Penetration Testing Worm Backups Security Policy Software updates Ransomware Vulnerability Multi-factor authentication (MFA) Compromise Breach Whale phishing Awareness Scareware Incident Response Zero- day Endpoint Screen lock policy Honeypot
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
APT (Advanced Persistent Threat)
Dark web
Threat Actor
Spoofing
IDS (Intrusion Detection System)
Sandbox
Phishing
Digital Certificate
Trojan
Botnet
Data Loss Prevention (DLP)
Insider Threat
Training
Exploit
Spear phishing
Threat Intelligence
IPS (Intrusion Prevention System)
Backdoor
Risk Assessment
Hashing
Cyberattack
Threat
Virus
Encryption
Compliance
Patch
Cyber Hygiene
Personally identifiable information (PII)
Reusing passwords
Malware
Intrusion
Social Engineering
Penetration Testing
Worm
Backups
Security Policy
Software updates
Ransomware
Vulnerability
Multi-factor authentication (MFA)
Compromise
Breach
Whale phishing
Awareness
Scareware
Incident Response
Zero-day
Endpoint
Screen lock policy
Honeypot