IDS (Intrusion Detection System) Phishing Digital Certificate Screen lock policy Backups Spear phishing Trojan Multi-factor authentication (MFA) Patch Threat Intelligence Dark web Ransomware Personally identifiable information (PII) Endpoint Threat Actor Penetration Testing APT (Advanced Persistent Threat) Honeypot Security Policy Sandbox Compromise Worm Incident Response Encryption Botnet Vulnerability Risk Assessment Insider Threat Awareness Threat Malware Social Engineering Scareware Cyber Hygiene Training Hashing Exploit Software updates Compliance Zero- day Cyberattack Intrusion IPS (Intrusion Prevention System) Reusing passwords Backdoor Virus Whale phishing Spoofing Data Loss Prevention (DLP) Breach IDS (Intrusion Detection System) Phishing Digital Certificate Screen lock policy Backups Spear phishing Trojan Multi-factor authentication (MFA) Patch Threat Intelligence Dark web Ransomware Personally identifiable information (PII) Endpoint Threat Actor Penetration Testing APT (Advanced Persistent Threat) Honeypot Security Policy Sandbox Compromise Worm Incident Response Encryption Botnet Vulnerability Risk Assessment Insider Threat Awareness Threat Malware Social Engineering Scareware Cyber Hygiene Training Hashing Exploit Software updates Compliance Zero- day Cyberattack Intrusion IPS (Intrusion Prevention System) Reusing passwords Backdoor Virus Whale phishing Spoofing Data Loss Prevention (DLP) Breach
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IDS (Intrusion Detection System)
Phishing
Digital Certificate
Screen lock policy
Backups
Spear phishing
Trojan
Multi-factor authentication (MFA)
Patch
Threat Intelligence
Dark web
Ransomware
Personally identifiable information (PII)
Endpoint
Threat Actor
Penetration Testing
APT (Advanced Persistent Threat)
Honeypot
Security Policy
Sandbox
Compromise
Worm
Incident Response
Encryption
Botnet
Vulnerability
Risk Assessment
Insider Threat
Awareness
Threat
Malware
Social Engineering
Scareware
Cyber Hygiene
Training
Hashing
Exploit
Software updates
Compliance
Zero-day
Cyberattack
Intrusion
IPS (Intrusion Prevention System)
Reusing passwords
Backdoor
Virus
Whale phishing
Spoofing
Data Loss Prevention (DLP)
Breach