Digital Signature Trojan Data Privacy Breach Information Security Session Hijacking Security Audit Certificate of Destruction Vulnerability Endpoint Security Cyber Attack Denial-of- Service (DoS) Network Segmentation Multi-Factor Authentication (MFA) Incident Response Public Key Infrastructure (PKI) Tokenization Transport Layer Security (TLS) Access Control Biometrics Patch Security Policy Penetration Testing Encryption Zero- Day Spyware Insider Threat Data Leak Phishing Authentication Identity Theft Security Information and Event Management (SIEM) Intrusion Detection Security Awareness Access Logs Malware Social Engineering Threat Intelligence Recovery Plan Firewall Authorization Risk Assessment Ransomware Secure Coding Compliance Virus Data Encryption Standard (DES) Secure Socket Layer (SSL) Backup Cloud Security Digital Signature Trojan Data Privacy Breach Information Security Session Hijacking Security Audit Certificate of Destruction Vulnerability Endpoint Security Cyber Attack Denial-of- Service (DoS) Network Segmentation Multi-Factor Authentication (MFA) Incident Response Public Key Infrastructure (PKI) Tokenization Transport Layer Security (TLS) Access Control Biometrics Patch Security Policy Penetration Testing Encryption Zero- Day Spyware Insider Threat Data Leak Phishing Authentication Identity Theft Security Information and Event Management (SIEM) Intrusion Detection Security Awareness Access Logs Malware Social Engineering Threat Intelligence Recovery Plan Firewall Authorization Risk Assessment Ransomware Secure Coding Compliance Virus Data Encryption Standard (DES) Secure Socket Layer (SSL) Backup Cloud Security
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Digital Signature
Trojan
Data Privacy
Breach
Information Security
Session Hijacking
Security Audit
Certificate of Destruction
Vulnerability
Endpoint Security
Cyber Attack
Denial-of-Service (DoS)
Network Segmentation
Multi-Factor Authentication (MFA)
Incident Response
Public Key Infrastructure (PKI)
Tokenization
Transport Layer Security (TLS)
Access Control
Biometrics
Patch
Security Policy
Penetration Testing
Encryption
Zero-Day
Spyware
Insider Threat
Data Leak
Phishing
Authentication
Identity Theft
Security Information and Event Management (SIEM)
Intrusion Detection
Security Awareness
Access Logs
Malware
Social Engineering
Threat Intelligence
Recovery Plan
Firewall
Authorization
Risk Assessment
Ransomware
Secure Coding
Compliance
Virus
Data Encryption Standard (DES)
Secure Socket Layer (SSL)
Backup
Cloud Security