Risk Assessment Scareware Backups Spoofing Worm Digital Certificate Zero- day Cyberattack Honeypot Security Policy Compromise Patch Training Trojan Whale phishing Threat Intrusion Vulnerability Botnet Sandbox Cyber Hygiene Exploit IPS (Intrusion Prevention System) Multi-factor authentication (MFA) Dark web Spear phishing Threat Actor Threat Intelligence Endpoint Virus Compliance IDS (Intrusion Detection System) APT (Advanced Persistent Threat) Phishing Breach Reusing passwords Malware Personally identifiable information (PII) Penetration Testing Screen lock policy Incident Response Software updates Encryption Hashing Social Engineering Data Loss Prevention (DLP) Awareness Insider Threat Ransomware Backdoor Risk Assessment Scareware Backups Spoofing Worm Digital Certificate Zero- day Cyberattack Honeypot Security Policy Compromise Patch Training Trojan Whale phishing Threat Intrusion Vulnerability Botnet Sandbox Cyber Hygiene Exploit IPS (Intrusion Prevention System) Multi-factor authentication (MFA) Dark web Spear phishing Threat Actor Threat Intelligence Endpoint Virus Compliance IDS (Intrusion Detection System) APT (Advanced Persistent Threat) Phishing Breach Reusing passwords Malware Personally identifiable information (PII) Penetration Testing Screen lock policy Incident Response Software updates Encryption Hashing Social Engineering Data Loss Prevention (DLP) Awareness Insider Threat Ransomware Backdoor
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Risk Assessment
Scareware
Backups
Spoofing
Worm
Digital Certificate
Zero-day
Cyberattack
Honeypot
Security Policy
Compromise
Patch
Training
Trojan
Whale phishing
Threat
Intrusion
Vulnerability
Botnet
Sandbox
Cyber Hygiene
Exploit
IPS (Intrusion Prevention System)
Multi-factor authentication (MFA)
Dark web
Spear phishing
Threat Actor
Threat Intelligence
Endpoint
Virus
Compliance
IDS (Intrusion Detection System)
APT (Advanced Persistent Threat)
Phishing
Breach
Reusing passwords
Malware
Personally identifiable information (PII)
Penetration Testing
Screen lock policy
Incident Response
Software updates
Encryption
Hashing
Social Engineering
Data Loss Prevention (DLP)
Awareness
Insider Threat
Ransomware
Backdoor