41. PublicKeyInfrastructure(PKI)27.PenetrationTesting5.Malware13.Breach31.Denial-of-Service(DoS)24. RiskAssessment20.CyberAttack29.Backup34.TransportLayerSecurity(TLS)40. DataEncryptionStandard(DES)38.CloudSecurity3.Encryption17. Multi-FactorAuthentication(MFA)30.RecoveryPlan43.SessionHijacking25.Compliance46.SecureCoding11.Vulnerability50. NetworkSegmentation32.IntrusionDetection12.Patch44.Tokenization48. SecurityInformationand EventManagement(SIEM)2.Authorization16.Zero-Day6.Phishing47.PhysicalSecurity18.AccessControl33. SecureSocketLayer(SSL)39.IdentityTheft9.Trojan10.Virus42.SecurityAudit8.Spyware19.EndpointSecurity21.DataPrivacy26.SecurityPolicy28.DataLeak35.DigitalSignature36.SecurityAwareness15. SocialEngineering7.Ransomware45.CertificateAuthority14.InsiderThreat22. ThreatIntelligence23.IncidentResponse37.Biometrics4.Firewall1.Authentication49.AccessLogs41. PublicKeyInfrastructure(PKI)27.PenetrationTesting5.Malware13.Breach31.Denial-of-Service(DoS)24. RiskAssessment20.CyberAttack29.Backup34.TransportLayerSecurity(TLS)40. DataEncryptionStandard(DES)38.CloudSecurity3.Encryption17. Multi-FactorAuthentication(MFA)30.RecoveryPlan43.SessionHijacking25.Compliance46.SecureCoding11.Vulnerability50. NetworkSegmentation32.IntrusionDetection12.Patch44.Tokenization48. SecurityInformationand EventManagement(SIEM)2.Authorization16.Zero-Day6.Phishing47.PhysicalSecurity18.AccessControl33. SecureSocketLayer(SSL)39.IdentityTheft9.Trojan10.Virus42.SecurityAudit8.Spyware19.EndpointSecurity21.DataPrivacy26.SecurityPolicy28.DataLeak35.DigitalSignature36.SecurityAwareness15. SocialEngineering7.Ransomware45.CertificateAuthority14.InsiderThreat22. ThreatIntelligence23.IncidentResponse37.Biometrics4.Firewall1.Authentication49.AccessLogs

It's Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. 41. Public Key Infrastructure (PKI)
  2. 27. Penetration Testing
  3. 5. Malware
  4. 13. Breach
  5. 31. Denial-of-Service (DoS)
  6. 24. Risk Assessment
  7. 20. Cyber Attack
  8. 29. Backup
  9. 34. Transport Layer Security (TLS)
  10. 40. Data Encryption Standard (DES)
  11. 38. Cloud Security
  12. 3. Encryption
  13. 17. Multi-Factor Authentication (MFA)
  14. 30. Recovery Plan
  15. 43. Session Hijacking
  16. 25. Compliance
  17. 46. Secure Coding
  18. 11. Vulnerability
  19. 50. Network Segmentation
  20. 32. Intrusion Detection
  21. 12. Patch
  22. 44. Tokenization
  23. 48. Security Information and Event Management (SIEM)
  24. 2. Authorization
  25. 16. Zero-Day
  26. 6. Phishing
  27. 47. Physical Security
  28. 18. Access Control
  29. 33. Secure Socket Layer (SSL)
  30. 39. Identity Theft
  31. 9. Trojan
  32. 10. Virus
  33. 42. Security Audit
  34. 8. Spyware
  35. 19. Endpoint Security
  36. 21. Data Privacy
  37. 26. Security Policy
  38. 28. Data Leak
  39. 35. Digital Signature
  40. 36. Security Awareness
  41. 15. Social Engineering
  42. 7. Ransomware
  43. 45. Certificate Authority
  44. 14. Insider Threat
  45. 22. Threat Intelligence
  46. 23. Incident Response
  47. 37. Biometrics
  48. 4. Firewall
  49. 1. Authentication
  50. 49. Access Logs