ExploitIDS(IntrusionDetectionSystem)ScreenlockpolicyIntrusionBackupsBackdoorHashingTrainingCyberHygieneBreachSpearphishingTrojanPatchVulnerabilityWhalephishingData LossPrevention(DLP)Personallyidentifiableinformation(PII)CompromiseVirusBotnetWormInsiderThreatThreatIntelligencePhishingCyberattackAPT(AdvancedPersistentThreat)SpoofingThreatActorReusingpasswordsIncidentResponseMalwareIPS(IntrusionPreventionSystem)EncryptionPenetrationTestingSocialEngineeringMulti-factorauthentication(MFA)HoneypotSoftwareupdatesDigitalCertificateDarkwebSandboxSecurityPolicyRiskAssessmentComplianceAwarenessEndpointScarewareZero-dayRansomwareThreatExploitIDS(IntrusionDetectionSystem)ScreenlockpolicyIntrusionBackupsBackdoorHashingTrainingCyberHygieneBreachSpearphishingTrojanPatchVulnerabilityWhalephishingData LossPrevention(DLP)Personallyidentifiableinformation(PII)CompromiseVirusBotnetWormInsiderThreatThreatIntelligencePhishingCyberattackAPT(AdvancedPersistentThreat)SpoofingThreatActorReusingpasswordsIncidentResponseMalwareIPS(IntrusionPreventionSystem)EncryptionPenetrationTestingSocialEngineeringMulti-factorauthentication(MFA)HoneypotSoftwareupdatesDigitalCertificateDarkwebSandboxSecurityPolicyRiskAssessmentComplianceAwarenessEndpointScarewareZero-dayRansomwareThreat

RGL Cybersecurity Bingo (for all Teammates) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Exploit
  2. IDS (Intrusion Detection System)
  3. Screen lock policy
  4. Intrusion
  5. Backups
  6. Backdoor
  7. Hashing
  8. Training
  9. Cyber Hygiene
  10. Breach
  11. Spear phishing
  12. Trojan
  13. Patch
  14. Vulnerability
  15. Whale phishing
  16. Data Loss Prevention (DLP)
  17. Personally identifiable information (PII)
  18. Compromise
  19. Virus
  20. Botnet
  21. Worm
  22. Insider Threat
  23. Threat Intelligence
  24. Phishing
  25. Cyberattack
  26. APT (Advanced Persistent Threat)
  27. Spoofing
  28. Threat Actor
  29. Reusing passwords
  30. Incident Response
  31. Malware
  32. IPS (Intrusion Prevention System)
  33. Encryption
  34. Penetration Testing
  35. Social Engineering
  36. Multi-factor authentication (MFA)
  37. Honeypot
  38. Software updates
  39. Digital Certificate
  40. Dark web
  41. Sandbox
  42. Security Policy
  43. Risk Assessment
  44. Compliance
  45. Awareness
  46. Endpoint
  47. Scareware
  48. Zero-day
  49. Ransomware
  50. Threat