DataPrivacyDenial-of-Service(DoS)RecoveryPlanCertificateofDestructionTrojanEncryptionDataLeakAuthorizationSecurityAwarenessSocialEngineeringFirewallCompliancePhishingSpywareTransportLayerSecurity(TLS)BiometricsAuthenticationPatchInformationSecurityInsiderThreatVulnerabilityIdentityTheftBreachSecureCodingPublic KeyInfrastructure(PKI)MalwareAccessLogsPenetrationTestingIncidentResponseNetworkSegmentationSecurityAuditSessionHijackingBackupIntrusionDetectionVirusSecureSocketLayer(SSL)CloudSecuritySecurityPolicyEndpointSecurityCyberAttackAccessControlZero-DayRiskAssessmentThreatIntelligenceRansomwareMulti-FactorAuthentication(MFA)SecurityInformationand EventManagement(SIEM)DigitalSignatureTokenizationDataEncryptionStandard(DES)DataPrivacyDenial-of-Service(DoS)RecoveryPlanCertificateofDestructionTrojanEncryptionDataLeakAuthorizationSecurityAwarenessSocialEngineeringFirewallCompliancePhishingSpywareTransportLayerSecurity(TLS)BiometricsAuthenticationPatchInformationSecurityInsiderThreatVulnerabilityIdentityTheftBreachSecureCodingPublic KeyInfrastructure(PKI)MalwareAccessLogsPenetrationTestingIncidentResponseNetworkSegmentationSecurityAuditSessionHijackingBackupIntrusionDetectionVirusSecureSocketLayer(SSL)CloudSecuritySecurityPolicyEndpointSecurityCyberAttackAccessControlZero-DayRiskAssessmentThreatIntelligenceRansomwareMulti-FactorAuthentication(MFA)SecurityInformationand EventManagement(SIEM)DigitalSignatureTokenizationDataEncryptionStandard(DES)

It's Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Data Privacy
  2. Denial-of-Service (DoS)
  3. Recovery Plan
  4. Certificate of Destruction
  5. Trojan
  6. Encryption
  7. Data Leak
  8. Authorization
  9. Security Awareness
  10. Social Engineering
  11. Firewall
  12. Compliance
  13. Phishing
  14. Spyware
  15. Transport Layer Security (TLS)
  16. Biometrics
  17. Authentication
  18. Patch
  19. Information Security
  20. Insider Threat
  21. Vulnerability
  22. Identity Theft
  23. Breach
  24. Secure Coding
  25. Public Key Infrastructure (PKI)
  26. Malware
  27. Access Logs
  28. Penetration Testing
  29. Incident Response
  30. Network Segmentation
  31. Security Audit
  32. Session Hijacking
  33. Backup
  34. Intrusion Detection
  35. Virus
  36. Secure Socket Layer (SSL)
  37. Cloud Security
  38. Security Policy
  39. Endpoint Security
  40. Cyber Attack
  41. Access Control
  42. Zero-Day
  43. Risk Assessment
  44. Threat Intelligence
  45. Ransomware
  46. Multi-Factor Authentication (MFA)
  47. Security Information and Event Management (SIEM)
  48. Digital Signature
  49. Tokenization
  50. Data Encryption Standard (DES)