Cyber Attack Patch Information Security Data Encryption Standard (DES) Public Key Infrastructure (PKI) Virus Risk Assessment Certificate of Destruction Incident Response Digital Signature Intrusion Detection Security Audit Recovery Plan Secure Socket Layer (SSL) Ransomware Session Hijacking Phishing Security Policy Transport Layer Security (TLS) Identity Theft Malware Access Logs Data Privacy Vulnerability Denial-of- Service (DoS) Compliance Multi-Factor Authentication (MFA) Threat Intelligence Access Control Social Engineering Security Awareness Penetration Testing Trojan Authorization Biometrics Spyware Authentication Tokenization Encryption Secure Coding Cloud Security Network Segmentation Insider Threat Breach Endpoint Security Security Information and Event Management (SIEM) Backup Firewall Data Leak Zero- Day Cyber Attack Patch Information Security Data Encryption Standard (DES) Public Key Infrastructure (PKI) Virus Risk Assessment Certificate of Destruction Incident Response Digital Signature Intrusion Detection Security Audit Recovery Plan Secure Socket Layer (SSL) Ransomware Session Hijacking Phishing Security Policy Transport Layer Security (TLS) Identity Theft Malware Access Logs Data Privacy Vulnerability Denial-of- Service (DoS) Compliance Multi-Factor Authentication (MFA) Threat Intelligence Access Control Social Engineering Security Awareness Penetration Testing Trojan Authorization Biometrics Spyware Authentication Tokenization Encryption Secure Coding Cloud Security Network Segmentation Insider Threat Breach Endpoint Security Security Information and Event Management (SIEM) Backup Firewall Data Leak Zero- Day
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyber Attack
Patch
Information Security
Data Encryption Standard (DES)
Public Key Infrastructure (PKI)
Virus
Risk Assessment
Certificate of Destruction
Incident Response
Digital Signature
Intrusion Detection
Security Audit
Recovery Plan
Secure Socket Layer (SSL)
Ransomware
Session Hijacking
Phishing
Security Policy
Transport Layer Security (TLS)
Identity Theft
Malware
Access Logs
Data Privacy
Vulnerability
Denial-of-Service (DoS)
Compliance
Multi-Factor Authentication (MFA)
Threat Intelligence
Access Control
Social Engineering
Security Awareness
Penetration Testing
Trojan
Authorization
Biometrics
Spyware
Authentication
Tokenization
Encryption
Secure Coding
Cloud Security
Network Segmentation
Insider Threat
Breach
Endpoint Security
Security Information and Event Management (SIEM)
Backup
Firewall
Data Leak
Zero-Day