6.Phishing32.IntrusionDetection5.Malware4.Firewall34.TransportLayerSecurity(TLS)1.Authentication2.Authorization20.CyberAttack16.Zero-Day45.CertificateAuthority14.InsiderThreat26.SecurityPolicy48. SecurityInformationand EventManagement(SIEM)42.SecurityAudit44.Tokenization27.PenetrationTesting41. PublicKeyInfrastructure(PKI)8.Spyware33. SecureSocketLayer(SSL)24. RiskAssessment38.CloudSecurity28.DataLeak30.RecoveryPlan50. NetworkSegmentation17. Multi-FactorAuthentication(MFA)15. SocialEngineering36.SecurityAwareness10.Virus25.Compliance39.IdentityTheft18.AccessControl3.Encryption37.Biometrics9.Trojan49.AccessLogs11.Vulnerability7.Ransomware31.Denial-of-Service(DoS)13.Breach19.EndpointSecurity21.DataPrivacy23.IncidentResponse22. ThreatIntelligence35.DigitalSignature12.Patch47.PhysicalSecurity29.Backup43.SessionHijacking46.SecureCoding40. DataEncryptionStandard(DES)6.Phishing32.IntrusionDetection5.Malware4.Firewall34.TransportLayerSecurity(TLS)1.Authentication2.Authorization20.CyberAttack16.Zero-Day45.CertificateAuthority14.InsiderThreat26.SecurityPolicy48. SecurityInformationand EventManagement(SIEM)42.SecurityAudit44.Tokenization27.PenetrationTesting41. PublicKeyInfrastructure(PKI)8.Spyware33. SecureSocketLayer(SSL)24. RiskAssessment38.CloudSecurity28.DataLeak30.RecoveryPlan50. NetworkSegmentation17. Multi-FactorAuthentication(MFA)15. SocialEngineering36.SecurityAwareness10.Virus25.Compliance39.IdentityTheft18.AccessControl3.Encryption37.Biometrics9.Trojan49.AccessLogs11.Vulnerability7.Ransomware31.Denial-of-Service(DoS)13.Breach19.EndpointSecurity21.DataPrivacy23.IncidentResponse22. ThreatIntelligence35.DigitalSignature12.Patch47.PhysicalSecurity29.Backup43.SessionHijacking46.SecureCoding40. DataEncryptionStandard(DES)

It's Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. 6. Phishing
  2. 32. Intrusion Detection
  3. 5. Malware
  4. 4. Firewall
  5. 34. Transport Layer Security (TLS)
  6. 1. Authentication
  7. 2. Authorization
  8. 20. Cyber Attack
  9. 16. Zero-Day
  10. 45. Certificate Authority
  11. 14. Insider Threat
  12. 26. Security Policy
  13. 48. Security Information and Event Management (SIEM)
  14. 42. Security Audit
  15. 44. Tokenization
  16. 27. Penetration Testing
  17. 41. Public Key Infrastructure (PKI)
  18. 8. Spyware
  19. 33. Secure Socket Layer (SSL)
  20. 24. Risk Assessment
  21. 38. Cloud Security
  22. 28. Data Leak
  23. 30. Recovery Plan
  24. 50. Network Segmentation
  25. 17. Multi-Factor Authentication (MFA)
  26. 15. Social Engineering
  27. 36. Security Awareness
  28. 10. Virus
  29. 25. Compliance
  30. 39. Identity Theft
  31. 18. Access Control
  32. 3. Encryption
  33. 37. Biometrics
  34. 9. Trojan
  35. 49. Access Logs
  36. 11. Vulnerability
  37. 7. Ransomware
  38. 31. Denial-of-Service (DoS)
  39. 13. Breach
  40. 19. Endpoint Security
  41. 21. Data Privacy
  42. 23. Incident Response
  43. 22. Threat Intelligence
  44. 35. Digital Signature
  45. 12. Patch
  46. 47. Physical Security
  47. 29. Backup
  48. 43. Session Hijacking
  49. 46. Secure Coding
  50. 40. Data Encryption Standard (DES)