Honeypot Risk Assessment Threat Intelligence Training Personally identifiable information (PII) Endpoint Compliance Threat Actor Sandbox Penetration Testing Virus Spoofing Backups Threat Whale phishing Exploit APT (Advanced Persistent Threat) Cyberattack Backdoor Phishing Dark web Cyber Hygiene Trojan Zero- day Digital Certificate Multi-factor authentication (MFA) Screen lock policy Security Policy Reusing passwords Encryption Data Loss Prevention (DLP) IPS (Intrusion Prevention System) Breach Ransomware IDS (Intrusion Detection System) Vulnerability Intrusion Spear phishing Software updates Awareness Incident Response Scareware Worm Compromise Hashing Social Engineering Botnet Patch Insider Threat Malware Honeypot Risk Assessment Threat Intelligence Training Personally identifiable information (PII) Endpoint Compliance Threat Actor Sandbox Penetration Testing Virus Spoofing Backups Threat Whale phishing Exploit APT (Advanced Persistent Threat) Cyberattack Backdoor Phishing Dark web Cyber Hygiene Trojan Zero- day Digital Certificate Multi-factor authentication (MFA) Screen lock policy Security Policy Reusing passwords Encryption Data Loss Prevention (DLP) IPS (Intrusion Prevention System) Breach Ransomware IDS (Intrusion Detection System) Vulnerability Intrusion Spear phishing Software updates Awareness Incident Response Scareware Worm Compromise Hashing Social Engineering Botnet Patch Insider Threat Malware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Honeypot
Risk Assessment
Threat Intelligence
Training
Personally identifiable information (PII)
Endpoint
Compliance
Threat Actor
Sandbox
Penetration Testing
Virus
Spoofing
Backups
Threat
Whale phishing
Exploit
APT (Advanced Persistent Threat)
Cyberattack
Backdoor
Phishing
Dark web
Cyber Hygiene
Trojan
Zero-day
Digital Certificate
Multi-factor authentication (MFA)
Screen lock policy
Security Policy
Reusing passwords
Encryption
Data Loss Prevention (DLP)
IPS (Intrusion Prevention System)
Breach
Ransomware
IDS (Intrusion Detection System)
Vulnerability
Intrusion
Spear phishing
Software updates
Awareness
Incident Response
Scareware
Worm
Compromise
Hashing
Social Engineering
Botnet
Patch
Insider Threat
Malware