Endpoint Phishing Backdoor Malware IPS (Intrusion Prevention System) Vulnerability Multi-factor authentication (MFA) Social Engineering Incident Response Screen lock policy Risk Assessment Threat Training Ransomware Zero- day Threat Intelligence Whale phishing Sandbox Data Loss Prevention (DLP) Digital Certificate Cyberattack Spoofing IDS (Intrusion Detection System) Scareware Software updates Patch Encryption Threat Actor Spear phishing Exploit Breach Worm Virus APT (Advanced Persistent Threat) Personally identifiable information (PII) Backups Reusing passwords Compromise Intrusion Trojan Penetration Testing Cyber Hygiene Dark web Awareness Honeypot Security Policy Hashing Botnet Compliance Insider Threat Endpoint Phishing Backdoor Malware IPS (Intrusion Prevention System) Vulnerability Multi-factor authentication (MFA) Social Engineering Incident Response Screen lock policy Risk Assessment Threat Training Ransomware Zero- day Threat Intelligence Whale phishing Sandbox Data Loss Prevention (DLP) Digital Certificate Cyberattack Spoofing IDS (Intrusion Detection System) Scareware Software updates Patch Encryption Threat Actor Spear phishing Exploit Breach Worm Virus APT (Advanced Persistent Threat) Personally identifiable information (PII) Backups Reusing passwords Compromise Intrusion Trojan Penetration Testing Cyber Hygiene Dark web Awareness Honeypot Security Policy Hashing Botnet Compliance Insider Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Endpoint
Phishing
Backdoor
Malware
IPS (Intrusion Prevention System)
Vulnerability
Multi-factor authentication (MFA)
Social Engineering
Incident Response
Screen lock policy
Risk Assessment
Threat
Training
Ransomware
Zero-day
Threat Intelligence
Whale phishing
Sandbox
Data Loss Prevention (DLP)
Digital Certificate
Cyberattack
Spoofing
IDS (Intrusion Detection System)
Scareware
Software updates
Patch
Encryption
Threat Actor
Spear phishing
Exploit
Breach
Worm
Virus
APT (Advanced Persistent Threat)
Personally identifiable information (PII)
Backups
Reusing passwords
Compromise
Intrusion
Trojan
Penetration Testing
Cyber Hygiene
Dark web
Awareness
Honeypot
Security Policy
Hashing
Botnet
Compliance
Insider Threat