Incident Response Social Engineering Security Policy Threat Reusing passwords IPS (Intrusion Prevention System) Threat Intelligence Worm Dark web Cyber Hygiene Phishing Screen lock policy Botnet Encryption Penetration Testing APT (Advanced Persistent Threat) Trojan Compromise Exploit Hashing Spear phishing Sandbox Compliance Breach Threat Actor Risk Assessment Whale phishing Awareness Scareware Malware Multi-factor authentication (MFA) Zero- day Backdoor Insider Threat Honeypot Cyberattack Endpoint Digital Certificate IDS (Intrusion Detection System) Software updates Vulnerability Patch Virus Intrusion Ransomware Personally identifiable information (PII) Backups Spoofing Data Loss Prevention (DLP) Training Incident Response Social Engineering Security Policy Threat Reusing passwords IPS (Intrusion Prevention System) Threat Intelligence Worm Dark web Cyber Hygiene Phishing Screen lock policy Botnet Encryption Penetration Testing APT (Advanced Persistent Threat) Trojan Compromise Exploit Hashing Spear phishing Sandbox Compliance Breach Threat Actor Risk Assessment Whale phishing Awareness Scareware Malware Multi-factor authentication (MFA) Zero- day Backdoor Insider Threat Honeypot Cyberattack Endpoint Digital Certificate IDS (Intrusion Detection System) Software updates Vulnerability Patch Virus Intrusion Ransomware Personally identifiable information (PII) Backups Spoofing Data Loss Prevention (DLP) Training
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Incident Response
Social Engineering
Security Policy
Threat
Reusing passwords
IPS (Intrusion Prevention System)
Threat Intelligence
Worm
Dark web
Cyber Hygiene
Phishing
Screen lock policy
Botnet
Encryption
Penetration Testing
APT (Advanced Persistent Threat)
Trojan
Compromise
Exploit
Hashing
Spear phishing
Sandbox
Compliance
Breach
Threat Actor
Risk Assessment
Whale phishing
Awareness
Scareware
Malware
Multi-factor authentication (MFA)
Zero-day
Backdoor
Insider Threat
Honeypot
Cyberattack
Endpoint
Digital Certificate
IDS (Intrusion Detection System)
Software updates
Vulnerability
Patch
Virus
Intrusion
Ransomware
Personally identifiable information (PII)
Backups
Spoofing
Data Loss Prevention (DLP)
Training