Certificate of Destruction Social Engineering Penetration Testing Security Policy Recovery Plan Secure Coding Denial-of- Service (DoS) Cloud Security Security Awareness Incident Response Trojan Phishing Security Information and Event Management (SIEM) Data Privacy Tokenization Digital Signature Firewall Information Security Identity Theft Network Segmentation Breach Cyber Attack Compliance Public Key Infrastructure (PKI) Spyware Access Control Vulnerability Threat Intelligence Endpoint Security Secure Socket Layer (SSL) Multi-Factor Authentication (MFA) Insider Threat Transport Layer Security (TLS) Zero- Day Encryption Biometrics Access Logs Malware Data Leak Patch Intrusion Detection Data Encryption Standard (DES) Backup Authentication Risk Assessment Security Audit Authorization Ransomware Session Hijacking Virus Certificate of Destruction Social Engineering Penetration Testing Security Policy Recovery Plan Secure Coding Denial-of- Service (DoS) Cloud Security Security Awareness Incident Response Trojan Phishing Security Information and Event Management (SIEM) Data Privacy Tokenization Digital Signature Firewall Information Security Identity Theft Network Segmentation Breach Cyber Attack Compliance Public Key Infrastructure (PKI) Spyware Access Control Vulnerability Threat Intelligence Endpoint Security Secure Socket Layer (SSL) Multi-Factor Authentication (MFA) Insider Threat Transport Layer Security (TLS) Zero- Day Encryption Biometrics Access Logs Malware Data Leak Patch Intrusion Detection Data Encryption Standard (DES) Backup Authentication Risk Assessment Security Audit Authorization Ransomware Session Hijacking Virus
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Certificate of Destruction
Social Engineering
Penetration Testing
Security Policy
Recovery Plan
Secure Coding
Denial-of-Service (DoS)
Cloud Security
Security Awareness
Incident Response
Trojan
Phishing
Security Information and Event Management (SIEM)
Data Privacy
Tokenization
Digital Signature
Firewall
Information Security
Identity Theft
Network Segmentation
Breach
Cyber Attack
Compliance
Public Key Infrastructure (PKI)
Spyware
Access Control
Vulnerability
Threat Intelligence
Endpoint Security
Secure Socket Layer (SSL)
Multi-Factor Authentication (MFA)
Insider Threat
Transport Layer Security (TLS)
Zero-Day
Encryption
Biometrics
Access Logs
Malware
Data Leak
Patch
Intrusion Detection
Data Encryption Standard (DES)
Backup
Authentication
Risk Assessment
Security Audit
Authorization
Ransomware
Session Hijacking
Virus