Exploit IDS (Intrusion Detection System) Screen lock policy Intrusion Backups Backdoor Hashing Training Cyber Hygiene Breach Spear phishing Trojan Patch Vulnerability Whale phishing Data Loss Prevention (DLP) Personally identifiable information (PII) Compromise Virus Botnet Worm Insider Threat Threat Intelligence Phishing Cyberattack APT (Advanced Persistent Threat) Spoofing Threat Actor Reusing passwords Incident Response Malware IPS (Intrusion Prevention System) Encryption Penetration Testing Social Engineering Multi-factor authentication (MFA) Honeypot Software updates Digital Certificate Dark web Sandbox Security Policy Risk Assessment Compliance Awareness Endpoint Scareware Zero- day Ransomware Threat Exploit IDS (Intrusion Detection System) Screen lock policy Intrusion Backups Backdoor Hashing Training Cyber Hygiene Breach Spear phishing Trojan Patch Vulnerability Whale phishing Data Loss Prevention (DLP) Personally identifiable information (PII) Compromise Virus Botnet Worm Insider Threat Threat Intelligence Phishing Cyberattack APT (Advanced Persistent Threat) Spoofing Threat Actor Reusing passwords Incident Response Malware IPS (Intrusion Prevention System) Encryption Penetration Testing Social Engineering Multi-factor authentication (MFA) Honeypot Software updates Digital Certificate Dark web Sandbox Security Policy Risk Assessment Compliance Awareness Endpoint Scareware Zero- day Ransomware Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Exploit
IDS (Intrusion Detection System)
Screen lock policy
Intrusion
Backups
Backdoor
Hashing
Training
Cyber Hygiene
Breach
Spear phishing
Trojan
Patch
Vulnerability
Whale phishing
Data Loss Prevention (DLP)
Personally identifiable information (PII)
Compromise
Virus
Botnet
Worm
Insider Threat
Threat Intelligence
Phishing
Cyberattack
APT (Advanced Persistent Threat)
Spoofing
Threat Actor
Reusing passwords
Incident Response
Malware
IPS (Intrusion Prevention System)
Encryption
Penetration Testing
Social Engineering
Multi-factor authentication (MFA)
Honeypot
Software updates
Digital Certificate
Dark web
Sandbox
Security Policy
Risk Assessment
Compliance
Awareness
Endpoint
Scareware
Zero-day
Ransomware
Threat