Backups Intrusion Virus Incident Response Spear phishing Scareware Trojan Botnet Risk Assessment Zero- day IPS (Intrusion Prevention System) Exploit Penetration Testing Honeypot Reusing passwords Cyber Hygiene Backdoor Threat Insider Threat Spoofing IDS (Intrusion Detection System) Data Loss Prevention (DLP) Multi-factor authentication (MFA) Personally identifiable information (PII) Screen lock policy Threat Actor Ransomware Dark web Hashing Breach Awareness Software updates Worm Compromise Threat Intelligence Training Cyberattack Phishing Vulnerability Digital Certificate APT (Advanced Persistent Threat) Compliance Patch Endpoint Encryption Social Engineering Whale phishing Malware Security Policy Sandbox Backups Intrusion Virus Incident Response Spear phishing Scareware Trojan Botnet Risk Assessment Zero- day IPS (Intrusion Prevention System) Exploit Penetration Testing Honeypot Reusing passwords Cyber Hygiene Backdoor Threat Insider Threat Spoofing IDS (Intrusion Detection System) Data Loss Prevention (DLP) Multi-factor authentication (MFA) Personally identifiable information (PII) Screen lock policy Threat Actor Ransomware Dark web Hashing Breach Awareness Software updates Worm Compromise Threat Intelligence Training Cyberattack Phishing Vulnerability Digital Certificate APT (Advanced Persistent Threat) Compliance Patch Endpoint Encryption Social Engineering Whale phishing Malware Security Policy Sandbox
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Backups
Intrusion
Virus
Incident Response
Spear phishing
Scareware
Trojan
Botnet
Risk Assessment
Zero-day
IPS (Intrusion Prevention System)
Exploit
Penetration Testing
Honeypot
Reusing passwords
Cyber Hygiene
Backdoor
Threat
Insider Threat
Spoofing
IDS (Intrusion Detection System)
Data Loss Prevention (DLP)
Multi-factor authentication (MFA)
Personally identifiable information (PII)
Screen lock policy
Threat Actor
Ransomware
Dark web
Hashing
Breach
Awareness
Software updates
Worm
Compromise
Threat Intelligence
Training
Cyberattack
Phishing
Vulnerability
Digital Certificate
APT (Advanced Persistent Threat)
Compliance
Patch
Endpoint
Encryption
Social Engineering
Whale phishing
Malware
Security Policy
Sandbox