Trojan Cyber Hygiene Compliance Risk Assessment Spoofing Cyberattack Worm Threat Encryption Threat Intelligence Virus Backups Ransomware Reusing passwords Patch Social Engineering Malware Vulnerability Digital Certificate Insider Threat Breach Hashing Exploit Dark web Data Loss Prevention (DLP) Training Incident Response Spear phishing Screen lock policy IPS (Intrusion Prevention System) Multi-factor authentication (MFA) Endpoint Sandbox Zero- day Personally identifiable information (PII) Software updates Botnet APT (Advanced Persistent Threat) Backdoor IDS (Intrusion Detection System) Honeypot Scareware Security Policy Threat Actor Whale phishing Awareness Intrusion Phishing Compromise Penetration Testing Trojan Cyber Hygiene Compliance Risk Assessment Spoofing Cyberattack Worm Threat Encryption Threat Intelligence Virus Backups Ransomware Reusing passwords Patch Social Engineering Malware Vulnerability Digital Certificate Insider Threat Breach Hashing Exploit Dark web Data Loss Prevention (DLP) Training Incident Response Spear phishing Screen lock policy IPS (Intrusion Prevention System) Multi-factor authentication (MFA) Endpoint Sandbox Zero- day Personally identifiable information (PII) Software updates Botnet APT (Advanced Persistent Threat) Backdoor IDS (Intrusion Detection System) Honeypot Scareware Security Policy Threat Actor Whale phishing Awareness Intrusion Phishing Compromise Penetration Testing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Trojan
Cyber Hygiene
Compliance
Risk Assessment
Spoofing
Cyberattack
Worm
Threat
Encryption
Threat Intelligence
Virus
Backups
Ransomware
Reusing passwords
Patch
Social Engineering
Malware
Vulnerability
Digital Certificate
Insider Threat
Breach
Hashing
Exploit
Dark web
Data Loss Prevention (DLP)
Training
Incident Response
Spear phishing
Screen lock policy
IPS (Intrusion Prevention System)
Multi-factor authentication (MFA)
Endpoint
Sandbox
Zero-day
Personally identifiable information (PII)
Software updates
Botnet
APT (Advanced Persistent Threat)
Backdoor
IDS (Intrusion Detection System)
Honeypot
Scareware
Security Policy
Threat Actor
Whale phishing
Awareness
Intrusion
Phishing
Compromise
Penetration Testing