Breach Malware Trojan Dark web Ransomware Threat Intelligence Penetration Testing Screen lock policy Virus Phishing Intrusion Software updates Zero- day Compromise Cyber Hygiene Compliance Spoofing IDS (Intrusion Detection System) Patch Threat Actor Reusing passwords Sandbox Insider Threat IPS (Intrusion Prevention System) Digital Certificate Honeypot Vulnerability Botnet Multi-factor authentication (MFA) Cyberattack Exploit Threat Endpoint Backups Risk Assessment Spear phishing Social Engineering APT (Advanced Persistent Threat) Encryption Scareware Awareness Incident Response Training Security Policy Whale phishing Hashing Backdoor Personally identifiable information (PII) Worm Data Loss Prevention (DLP) Breach Malware Trojan Dark web Ransomware Threat Intelligence Penetration Testing Screen lock policy Virus Phishing Intrusion Software updates Zero- day Compromise Cyber Hygiene Compliance Spoofing IDS (Intrusion Detection System) Patch Threat Actor Reusing passwords Sandbox Insider Threat IPS (Intrusion Prevention System) Digital Certificate Honeypot Vulnerability Botnet Multi-factor authentication (MFA) Cyberattack Exploit Threat Endpoint Backups Risk Assessment Spear phishing Social Engineering APT (Advanced Persistent Threat) Encryption Scareware Awareness Incident Response Training Security Policy Whale phishing Hashing Backdoor Personally identifiable information (PII) Worm Data Loss Prevention (DLP)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Breach
Malware
Trojan
Dark web
Ransomware
Threat Intelligence
Penetration Testing
Screen lock policy
Virus
Phishing
Intrusion
Software updates
Zero-day
Compromise
Cyber Hygiene
Compliance
Spoofing
IDS (Intrusion Detection System)
Patch
Threat Actor
Reusing passwords
Sandbox
Insider Threat
IPS (Intrusion Prevention System)
Digital Certificate
Honeypot
Vulnerability
Botnet
Multi-factor authentication (MFA)
Cyberattack
Exploit
Threat
Endpoint
Backups
Risk Assessment
Spear phishing
Social Engineering
APT (Advanced Persistent Threat)
Encryption
Scareware
Awareness
Incident Response
Training
Security Policy
Whale phishing
Hashing
Backdoor
Personally identifiable information (PII)
Worm
Data Loss Prevention (DLP)