Endpoint Security Multi-Factor Authentication (MFA) Social Engineering Biometrics Access Logs Malware Security Information and Event Management (SIEM) Denial-of- Service (DoS) Insider Threat Intrusion Detection Compliance Access Control Phishing Trojan Vulnerability Information Security Security Audit Cyber Attack Digital Signature Transport Layer Security (TLS) Security Policy Certificate of Destruction Virus Tokenization Backup Secure Coding Data Encryption Standard (DES) Risk Assessment Firewall Spyware Authorization Recovery Plan Ransomware Incident Response Encryption Data Privacy Breach Threat Intelligence Cloud Security Penetration Testing Public Key Infrastructure (PKI) Security Awareness Patch Zero- Day Identity Theft Authentication Session Hijacking Secure Socket Layer (SSL) Network Segmentation Data Leak Endpoint Security Multi-Factor Authentication (MFA) Social Engineering Biometrics Access Logs Malware Security Information and Event Management (SIEM) Denial-of- Service (DoS) Insider Threat Intrusion Detection Compliance Access Control Phishing Trojan Vulnerability Information Security Security Audit Cyber Attack Digital Signature Transport Layer Security (TLS) Security Policy Certificate of Destruction Virus Tokenization Backup Secure Coding Data Encryption Standard (DES) Risk Assessment Firewall Spyware Authorization Recovery Plan Ransomware Incident Response Encryption Data Privacy Breach Threat Intelligence Cloud Security Penetration Testing Public Key Infrastructure (PKI) Security Awareness Patch Zero- Day Identity Theft Authentication Session Hijacking Secure Socket Layer (SSL) Network Segmentation Data Leak
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Endpoint Security
Multi-Factor Authentication (MFA)
Social Engineering
Biometrics
Access Logs
Malware
Security Information and Event Management (SIEM)
Denial-of-Service (DoS)
Insider Threat
Intrusion Detection
Compliance
Access Control
Phishing
Trojan
Vulnerability
Information Security
Security Audit
Cyber Attack
Digital Signature
Transport Layer Security (TLS)
Security Policy
Certificate of Destruction
Virus
Tokenization
Backup
Secure Coding
Data Encryption Standard (DES)
Risk Assessment
Firewall
Spyware
Authorization
Recovery Plan
Ransomware
Incident Response
Encryption
Data Privacy
Breach
Threat Intelligence
Cloud Security
Penetration Testing
Public Key Infrastructure (PKI)
Security Awareness
Patch
Zero-Day
Identity Theft
Authentication
Session Hijacking
Secure Socket Layer (SSL)
Network Segmentation
Data Leak