BackdoorThreatIDS(IntrusionDetectionSystem)SandboxEncryptionHoneypotScarewareZero-dayInsiderThreatEndpointVirusVulnerabilitySpearphishingSpoofingSecurityPolicyExploitBreachBotnetDarkwebThreatIntelligenceIntrusionPenetrationTestingHashingScreenlockpolicyPersonallyidentifiableinformation(PII)CompromiseAPT(AdvancedPersistentThreat)WhalephishingCyberattackSocialEngineeringRiskAssessmentMulti-factorauthentication(MFA)Data LossPrevention(DLP)SoftwareupdatesPhishingTrainingPatchIncidentResponseComplianceThreatActorIPS(IntrusionPreventionSystem)DigitalCertificateReusingpasswordsTrojanCyberHygieneMalwareWormBackupsRansomwareAwarenessBackdoorThreatIDS(IntrusionDetectionSystem)SandboxEncryptionHoneypotScarewareZero-dayInsiderThreatEndpointVirusVulnerabilitySpearphishingSpoofingSecurityPolicyExploitBreachBotnetDarkwebThreatIntelligenceIntrusionPenetrationTestingHashingScreenlockpolicyPersonallyidentifiableinformation(PII)CompromiseAPT(AdvancedPersistentThreat)WhalephishingCyberattackSocialEngineeringRiskAssessmentMulti-factorauthentication(MFA)Data LossPrevention(DLP)SoftwareupdatesPhishingTrainingPatchIncidentResponseComplianceThreatActorIPS(IntrusionPreventionSystem)DigitalCertificateReusingpasswordsTrojanCyberHygieneMalwareWormBackupsRansomwareAwareness

RGL Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Backdoor
  2. Threat
  3. IDS (Intrusion Detection System)
  4. Sandbox
  5. Encryption
  6. Honeypot
  7. Scareware
  8. Zero-day
  9. Insider Threat
  10. Endpoint
  11. Virus
  12. Vulnerability
  13. Spear phishing
  14. Spoofing
  15. Security Policy
  16. Exploit
  17. Breach
  18. Botnet
  19. Dark web
  20. Threat Intelligence
  21. Intrusion
  22. Penetration Testing
  23. Hashing
  24. Screen lock policy
  25. Personally identifiable information (PII)
  26. Compromise
  27. APT (Advanced Persistent Threat)
  28. Whale phishing
  29. Cyberattack
  30. Social Engineering
  31. Risk Assessment
  32. Multi-factor authentication (MFA)
  33. Data Loss Prevention (DLP)
  34. Software updates
  35. Phishing
  36. Training
  37. Patch
  38. Incident Response
  39. Compliance
  40. Threat Actor
  41. IPS (Intrusion Prevention System)
  42. Digital Certificate
  43. Reusing passwords
  44. Trojan
  45. Cyber Hygiene
  46. Malware
  47. Worm
  48. Backups
  49. Ransomware
  50. Awareness