Cyber Attack Endpoint Security Backup Trojan Secure Coding Biometrics Security Information and Event Management (SIEM) Session Hijacking Transport Layer Security (TLS) Malware Recovery Plan Risk Assessment Spyware Phishing Access Logs Breach Data Leak Social Engineering Incident Response Certificate of Destruction Intrusion Detection Digital Signature Data Privacy Encryption Security Policy Patch Compliance Secure Socket Layer (SSL) Penetration Testing Virus Firewall Network Segmentation Data Encryption Standard (DES) Denial-of- Service (DoS) Vulnerability Tokenization Identity Theft Multi-Factor Authentication (MFA) Authentication Ransomware Public Key Infrastructure (PKI) Zero- Day Security Audit Access Control Cloud Security Threat Intelligence Insider Threat Information Security Authorization Security Awareness Cyber Attack Endpoint Security Backup Trojan Secure Coding Biometrics Security Information and Event Management (SIEM) Session Hijacking Transport Layer Security (TLS) Malware Recovery Plan Risk Assessment Spyware Phishing Access Logs Breach Data Leak Social Engineering Incident Response Certificate of Destruction Intrusion Detection Digital Signature Data Privacy Encryption Security Policy Patch Compliance Secure Socket Layer (SSL) Penetration Testing Virus Firewall Network Segmentation Data Encryption Standard (DES) Denial-of- Service (DoS) Vulnerability Tokenization Identity Theft Multi-Factor Authentication (MFA) Authentication Ransomware Public Key Infrastructure (PKI) Zero- Day Security Audit Access Control Cloud Security Threat Intelligence Insider Threat Information Security Authorization Security Awareness
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyber Attack
Endpoint Security
Backup
Trojan
Secure Coding
Biometrics
Security Information and Event Management (SIEM)
Session Hijacking
Transport Layer Security (TLS)
Malware
Recovery Plan
Risk Assessment
Spyware
Phishing
Access Logs
Breach
Data Leak
Social Engineering
Incident Response
Certificate of Destruction
Intrusion Detection
Digital Signature
Data Privacy
Encryption
Security Policy
Patch
Compliance
Secure Socket Layer (SSL)
Penetration Testing
Virus
Firewall
Network Segmentation
Data Encryption Standard (DES)
Denial-of-Service (DoS)
Vulnerability
Tokenization
Identity Theft
Multi-Factor Authentication (MFA)
Authentication
Ransomware
Public Key Infrastructure (PKI)
Zero-Day
Security Audit
Access Control
Cloud Security
Threat Intelligence
Insider Threat
Information Security
Authorization
Security Awareness