31.Denial-of-Service(DoS)33. SecureSocketLayer(SSL)8.Spyware36.SecurityAwareness30.RecoveryPlan14.InsiderThreat16.Zero-Day46.SecureCoding41. PublicKeyInfrastructure(PKI)35.DigitalSignature45.CertificateAuthority11.Vulnerability42.SecurityAudit47.PhysicalSecurity48. SecurityInformationand EventManagement(SIEM)17. Multi-FactorAuthentication(MFA)26.SecurityPolicy32.IntrusionDetection29.Backup43.SessionHijacking44.Tokenization2.Authorization4.Firewall22. ThreatIntelligence38.CloudSecurity13.Breach5.Malware10.Virus7.Ransomware21.DataPrivacy25.Compliance15. SocialEngineering9.Trojan23.IncidentResponse12.Patch39.IdentityTheft28.DataLeak1.Authentication50. NetworkSegmentation3.Encryption18.AccessControl19.EndpointSecurity20.CyberAttack40. DataEncryptionStandard(DES)27.PenetrationTesting49.AccessLogs34.TransportLayerSecurity(TLS)24. RiskAssessment6.Phishing37.Biometrics31.Denial-of-Service(DoS)33. SecureSocketLayer(SSL)8.Spyware36.SecurityAwareness30.RecoveryPlan14.InsiderThreat16.Zero-Day46.SecureCoding41. PublicKeyInfrastructure(PKI)35.DigitalSignature45.CertificateAuthority11.Vulnerability42.SecurityAudit47.PhysicalSecurity48. SecurityInformationand EventManagement(SIEM)17. Multi-FactorAuthentication(MFA)26.SecurityPolicy32.IntrusionDetection29.Backup43.SessionHijacking44.Tokenization2.Authorization4.Firewall22. ThreatIntelligence38.CloudSecurity13.Breach5.Malware10.Virus7.Ransomware21.DataPrivacy25.Compliance15. SocialEngineering9.Trojan23.IncidentResponse12.Patch39.IdentityTheft28.DataLeak1.Authentication50. NetworkSegmentation3.Encryption18.AccessControl19.EndpointSecurity20.CyberAttack40. DataEncryptionStandard(DES)27.PenetrationTesting49.AccessLogs34.TransportLayerSecurity(TLS)24. RiskAssessment6.Phishing37.Biometrics

It's Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. 31. Denial-of-Service (DoS)
  2. 33. Secure Socket Layer (SSL)
  3. 8. Spyware
  4. 36. Security Awareness
  5. 30. Recovery Plan
  6. 14. Insider Threat
  7. 16. Zero-Day
  8. 46. Secure Coding
  9. 41. Public Key Infrastructure (PKI)
  10. 35. Digital Signature
  11. 45. Certificate Authority
  12. 11. Vulnerability
  13. 42. Security Audit
  14. 47. Physical Security
  15. 48. Security Information and Event Management (SIEM)
  16. 17. Multi-Factor Authentication (MFA)
  17. 26. Security Policy
  18. 32. Intrusion Detection
  19. 29. Backup
  20. 43. Session Hijacking
  21. 44. Tokenization
  22. 2. Authorization
  23. 4. Firewall
  24. 22. Threat Intelligence
  25. 38. Cloud Security
  26. 13. Breach
  27. 5. Malware
  28. 10. Virus
  29. 7. Ransomware
  30. 21. Data Privacy
  31. 25. Compliance
  32. 15. Social Engineering
  33. 9. Trojan
  34. 23. Incident Response
  35. 12. Patch
  36. 39. Identity Theft
  37. 28. Data Leak
  38. 1. Authentication
  39. 50. Network Segmentation
  40. 3. Encryption
  41. 18. Access Control
  42. 19. Endpoint Security
  43. 20. Cyber Attack
  44. 40. Data Encryption Standard (DES)
  45. 27. Penetration Testing
  46. 49. Access Logs
  47. 34. Transport Layer Security (TLS)
  48. 24. Risk Assessment
  49. 6. Phishing
  50. 37. Biometrics