Threat Threat Intelligence Spear phishing Spoofing Incident Response Compromise Intrusion Risk Assessment Cyberattack Patch Dark web Exploit Reusing passwords Encryption IDS (Intrusion Detection System) Hashing Security Policy Sandbox Worm Whale phishing Multi-factor authentication (MFA) Personally identifiable information (PII) Trojan Zero- day Threat Actor Awareness Digital Certificate Social Engineering Breach Training Screen lock policy Honeypot Penetration Testing Vulnerability Insider Threat Compliance Phishing Cyber Hygiene Backdoor Malware Endpoint Software updates Scareware Backups Ransomware IPS (Intrusion Prevention System) Data Loss Prevention (DLP) APT (Advanced Persistent Threat) Virus Botnet Threat Threat Intelligence Spear phishing Spoofing Incident Response Compromise Intrusion Risk Assessment Cyberattack Patch Dark web Exploit Reusing passwords Encryption IDS (Intrusion Detection System) Hashing Security Policy Sandbox Worm Whale phishing Multi-factor authentication (MFA) Personally identifiable information (PII) Trojan Zero- day Threat Actor Awareness Digital Certificate Social Engineering Breach Training Screen lock policy Honeypot Penetration Testing Vulnerability Insider Threat Compliance Phishing Cyber Hygiene Backdoor Malware Endpoint Software updates Scareware Backups Ransomware IPS (Intrusion Prevention System) Data Loss Prevention (DLP) APT (Advanced Persistent Threat) Virus Botnet
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat
Threat Intelligence
Spear phishing
Spoofing
Incident Response
Compromise
Intrusion
Risk Assessment
Cyberattack
Patch
Dark web
Exploit
Reusing passwords
Encryption
IDS (Intrusion Detection System)
Hashing
Security Policy
Sandbox
Worm
Whale phishing
Multi-factor authentication (MFA)
Personally identifiable information (PII)
Trojan
Zero-day
Threat Actor
Awareness
Digital Certificate
Social Engineering
Breach
Training
Screen lock policy
Honeypot
Penetration Testing
Vulnerability
Insider Threat
Compliance
Phishing
Cyber Hygiene
Backdoor
Malware
Endpoint
Software updates
Scareware
Backups
Ransomware
IPS (Intrusion Prevention System)
Data Loss Prevention (DLP)
APT (Advanced Persistent Threat)
Virus
Botnet