Compliance APT (Advanced Persistent Threat) Threat Intelligence Encryption Threat Actor Awareness Spoofing Personally identifiable information (PII) Malware Exploit Training Security Policy Scareware Dark web Honeypot Incident Response Vulnerability Hashing Whale phishing Breach Sandbox Trojan Spear phishing Risk Assessment Digital Certificate Botnet Software updates Penetration Testing Patch Multi-factor authentication (MFA) Intrusion Compromise Endpoint Data Loss Prevention (DLP) Backdoor Virus Worm IPS (Intrusion Prevention System) Reusing passwords Cyber Hygiene Threat Backups Ransomware Zero- day Screen lock policy Social Engineering Cyberattack IDS (Intrusion Detection System) Insider Threat Phishing Compliance APT (Advanced Persistent Threat) Threat Intelligence Encryption Threat Actor Awareness Spoofing Personally identifiable information (PII) Malware Exploit Training Security Policy Scareware Dark web Honeypot Incident Response Vulnerability Hashing Whale phishing Breach Sandbox Trojan Spear phishing Risk Assessment Digital Certificate Botnet Software updates Penetration Testing Patch Multi-factor authentication (MFA) Intrusion Compromise Endpoint Data Loss Prevention (DLP) Backdoor Virus Worm IPS (Intrusion Prevention System) Reusing passwords Cyber Hygiene Threat Backups Ransomware Zero- day Screen lock policy Social Engineering Cyberattack IDS (Intrusion Detection System) Insider Threat Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Compliance
APT (Advanced Persistent Threat)
Threat Intelligence
Encryption
Threat Actor
Awareness
Spoofing
Personally identifiable information (PII)
Malware
Exploit
Training
Security Policy
Scareware
Dark web
Honeypot
Incident Response
Vulnerability
Hashing
Whale phishing
Breach
Sandbox
Trojan
Spear phishing
Risk Assessment
Digital Certificate
Botnet
Software updates
Penetration Testing
Patch
Multi-factor authentication (MFA)
Intrusion
Compromise
Endpoint
Data Loss Prevention (DLP)
Backdoor
Virus
Worm
IPS (Intrusion Prevention System)
Reusing passwords
Cyber Hygiene
Threat
Backups
Ransomware
Zero-day
Screen lock policy
Social Engineering
Cyberattack
IDS (Intrusion Detection System)
Insider Threat
Phishing