Training Honeypot Botnet Patch Reusing passwords Penetration Testing Data Loss Prevention (DLP) Multi-factor authentication (MFA) Backups IPS (Intrusion Prevention System) Backdoor Worm Sandbox Breach Awareness Phishing Screen lock policy Threat Exploit Software updates Insider Threat Malware Security Policy Threat Intelligence IDS (Intrusion Detection System) Cyberattack Whale phishing Threat Actor Digital Certificate Ransomware Intrusion Hashing Spoofing Scareware APT (Advanced Persistent Threat) Spear phishing Cyber Hygiene Risk Assessment Compromise Vulnerability Social Engineering Compliance Incident Response Dark web Endpoint Trojan Zero- day Personally identifiable information (PII) Encryption Virus Training Honeypot Botnet Patch Reusing passwords Penetration Testing Data Loss Prevention (DLP) Multi-factor authentication (MFA) Backups IPS (Intrusion Prevention System) Backdoor Worm Sandbox Breach Awareness Phishing Screen lock policy Threat Exploit Software updates Insider Threat Malware Security Policy Threat Intelligence IDS (Intrusion Detection System) Cyberattack Whale phishing Threat Actor Digital Certificate Ransomware Intrusion Hashing Spoofing Scareware APT (Advanced Persistent Threat) Spear phishing Cyber Hygiene Risk Assessment Compromise Vulnerability Social Engineering Compliance Incident Response Dark web Endpoint Trojan Zero- day Personally identifiable information (PII) Encryption Virus
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Training
Honeypot
Botnet
Patch
Reusing passwords
Penetration Testing
Data Loss Prevention (DLP)
Multi-factor authentication (MFA)
Backups
IPS (Intrusion Prevention System)
Backdoor
Worm
Sandbox
Breach
Awareness
Phishing
Screen lock policy
Threat
Exploit
Software updates
Insider Threat
Malware
Security Policy
Threat Intelligence
IDS (Intrusion Detection System)
Cyberattack
Whale phishing
Threat Actor
Digital Certificate
Ransomware
Intrusion
Hashing
Spoofing
Scareware
APT (Advanced Persistent Threat)
Spear phishing
Cyber Hygiene
Risk Assessment
Compromise
Vulnerability
Social Engineering
Compliance
Incident Response
Dark web
Endpoint
Trojan
Zero-day
Personally identifiable information (PII)
Encryption
Virus