Data Privacy Denial-of- Service (DoS) Recovery Plan Certificate of Destruction Trojan Encryption Data Leak Authorization Security Awareness Social Engineering Firewall Compliance Phishing Spyware Transport Layer Security (TLS) Biometrics Authentication Patch Information Security Insider Threat Vulnerability Identity Theft Breach Secure Coding Public Key Infrastructure (PKI) Malware Access Logs Penetration Testing Incident Response Network Segmentation Security Audit Session Hijacking Backup Intrusion Detection Virus Secure Socket Layer (SSL) Cloud Security Security Policy Endpoint Security Cyber Attack Access Control Zero- Day Risk Assessment Threat Intelligence Ransomware Multi-Factor Authentication (MFA) Security Information and Event Management (SIEM) Digital Signature Tokenization Data Encryption Standard (DES) Data Privacy Denial-of- Service (DoS) Recovery Plan Certificate of Destruction Trojan Encryption Data Leak Authorization Security Awareness Social Engineering Firewall Compliance Phishing Spyware Transport Layer Security (TLS) Biometrics Authentication Patch Information Security Insider Threat Vulnerability Identity Theft Breach Secure Coding Public Key Infrastructure (PKI) Malware Access Logs Penetration Testing Incident Response Network Segmentation Security Audit Session Hijacking Backup Intrusion Detection Virus Secure Socket Layer (SSL) Cloud Security Security Policy Endpoint Security Cyber Attack Access Control Zero- Day Risk Assessment Threat Intelligence Ransomware Multi-Factor Authentication (MFA) Security Information and Event Management (SIEM) Digital Signature Tokenization Data Encryption Standard (DES)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Privacy
Denial-of-Service (DoS)
Recovery Plan
Certificate of Destruction
Trojan
Encryption
Data Leak
Authorization
Security Awareness
Social Engineering
Firewall
Compliance
Phishing
Spyware
Transport Layer Security (TLS)
Biometrics
Authentication
Patch
Information Security
Insider Threat
Vulnerability
Identity Theft
Breach
Secure Coding
Public Key Infrastructure (PKI)
Malware
Access Logs
Penetration Testing
Incident Response
Network Segmentation
Security Audit
Session Hijacking
Backup
Intrusion Detection
Virus
Secure Socket Layer (SSL)
Cloud Security
Security Policy
Endpoint Security
Cyber Attack
Access Control
Zero-Day
Risk Assessment
Threat Intelligence
Ransomware
Multi-Factor Authentication (MFA)
Security Information and Event Management (SIEM)
Digital Signature
Tokenization
Data Encryption Standard (DES)