IPS (Intrusion Prevention System) Zero- day Cyberattack Scareware Breach Digital Certificate Exploit Cyber Hygiene IDS (Intrusion Detection System) Multi-factor authentication (MFA) Backdoor Hashing Spear phishing Security Policy Incident Response Threat Data Loss Prevention (DLP) Social Engineering Worm Botnet Insider Threat Trojan Endpoint Intrusion Threat Actor Vulnerability Screen lock policy Compromise Sandbox Backups Ransomware Encryption Spoofing Phishing Patch APT (Advanced Persistent Threat) Personally identifiable information (PII) Threat Intelligence Virus Awareness Compliance Whale phishing Software updates Risk Assessment Honeypot Dark web Training Malware Penetration Testing Reusing passwords IPS (Intrusion Prevention System) Zero- day Cyberattack Scareware Breach Digital Certificate Exploit Cyber Hygiene IDS (Intrusion Detection System) Multi-factor authentication (MFA) Backdoor Hashing Spear phishing Security Policy Incident Response Threat Data Loss Prevention (DLP) Social Engineering Worm Botnet Insider Threat Trojan Endpoint Intrusion Threat Actor Vulnerability Screen lock policy Compromise Sandbox Backups Ransomware Encryption Spoofing Phishing Patch APT (Advanced Persistent Threat) Personally identifiable information (PII) Threat Intelligence Virus Awareness Compliance Whale phishing Software updates Risk Assessment Honeypot Dark web Training Malware Penetration Testing Reusing passwords
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IPS (Intrusion Prevention System)
Zero-day
Cyberattack
Scareware
Breach
Digital Certificate
Exploit
Cyber Hygiene
IDS (Intrusion Detection System)
Multi-factor authentication (MFA)
Backdoor
Hashing
Spear phishing
Security Policy
Incident Response
Threat
Data Loss Prevention (DLP)
Social Engineering
Worm
Botnet
Insider Threat
Trojan
Endpoint
Intrusion
Threat Actor
Vulnerability
Screen lock policy
Compromise
Sandbox
Backups
Ransomware
Encryption
Spoofing
Phishing
Patch
APT (Advanced Persistent Threat)
Personally identifiable information (PII)
Threat Intelligence
Virus
Awareness
Compliance
Whale phishing
Software updates
Risk Assessment
Honeypot
Dark web
Training
Malware
Penetration Testing
Reusing passwords