Security Policy APT (Advanced Persistent Threat) Trojan Threat Intrusion Screen lock policy Endpoint Personally identifiable information (PII) Spoofing Threat Intelligence Insider Threat Phishing Cyber Hygiene Data Loss Prevention (DLP) Virus Worm Honeypot Vulnerability Hashing Reusing passwords Spear phishing Ransomware Multi-factor authentication (MFA) Backdoor Digital Certificate Incident Response Compromise Zero- day Malware Penetration Testing IDS (Intrusion Detection System) Awareness Botnet Threat Actor Breach Risk Assessment Scareware Exploit IPS (Intrusion Prevention System) Cyberattack Patch Training Social Engineering Compliance Sandbox Dark web Whale phishing Software updates Backups Encryption Security Policy APT (Advanced Persistent Threat) Trojan Threat Intrusion Screen lock policy Endpoint Personally identifiable information (PII) Spoofing Threat Intelligence Insider Threat Phishing Cyber Hygiene Data Loss Prevention (DLP) Virus Worm Honeypot Vulnerability Hashing Reusing passwords Spear phishing Ransomware Multi-factor authentication (MFA) Backdoor Digital Certificate Incident Response Compromise Zero- day Malware Penetration Testing IDS (Intrusion Detection System) Awareness Botnet Threat Actor Breach Risk Assessment Scareware Exploit IPS (Intrusion Prevention System) Cyberattack Patch Training Social Engineering Compliance Sandbox Dark web Whale phishing Software updates Backups Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security Policy
APT (Advanced Persistent Threat)
Trojan
Threat
Intrusion
Screen lock policy
Endpoint
Personally identifiable information (PII)
Spoofing
Threat Intelligence
Insider Threat
Phishing
Cyber Hygiene
Data Loss Prevention (DLP)
Virus
Worm
Honeypot
Vulnerability
Hashing
Reusing passwords
Spear phishing
Ransomware
Multi-factor authentication (MFA)
Backdoor
Digital Certificate
Incident Response
Compromise
Zero-day
Malware
Penetration Testing
IDS (Intrusion Detection System)
Awareness
Botnet
Threat Actor
Breach
Risk Assessment
Scareware
Exploit
IPS (Intrusion Prevention System)
Cyberattack
Patch
Training
Social Engineering
Compliance
Sandbox
Dark web
Whale phishing
Software updates
Backups
Encryption