UAC EDR Spoofing Zero- day VPN OSINT Trojan Insider threat Zero trust MFA SIEM Security awareness Adware Proxy Cryptography C2 server Firewall Free! Decryption Cyberattack Digital footprint Antivirus Reverse engineering Backup White hat Asset management Vulnerability Brute force Botnet Threat modeling Cipher Spyware SQL injection IPS Ransomware Smishing Least privilege Web application firewall IDS Privilege escalation Domain hijacking Man- in-the- middle Cybercrime Threat hunting Malvertising SOC Supply chain attack Data breach Exploit Penetration testing Malware IAM DDoS Secure coding Incident response Social engineering Authentication Threat intelligence Cyber hygiene Digital forensics Endpoint security Zombie Honeypot Hashing AES Tokenization Cloud security Encryption Worm Phishing APT Risk assessment Certificate UAC EDR Spoofing Zero- day VPN OSINT Trojan Insider threat Zero trust MFA SIEM Security awareness Adware Proxy Cryptography C2 server Firewall Free! Decryption Cyberattack Digital footprint Antivirus Reverse engineering Backup White hat Asset management Vulnerability Brute force Botnet Threat modeling Cipher Spyware SQL injection IPS Ransomware Smishing Least privilege Web application firewall IDS Privilege escalation Domain hijacking Man- in-the- middle Cybercrime Threat hunting Malvertising SOC Supply chain attack Data breach Exploit Penetration testing Malware IAM DDoS Secure coding Incident response Social engineering Authentication Threat intelligence Cyber hygiene Digital forensics Endpoint security Zombie Honeypot Hashing AES Tokenization Cloud security Encryption Worm Phishing APT Risk assessment Certificate
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
UAC
EDR
Spoofing
Zero-day
VPN
OSINT
Trojan
Insider threat
Zero trust
MFA
SIEM
Security awareness
Adware
Proxy
Cryptography
C2 server
Firewall
Free!
Decryption
Cyberattack
Digital footprint
Antivirus
Reverse engineering
Backup
White hat
Asset management
Vulnerability
Brute force
Botnet
Threat modeling
Cipher
Spyware
SQL injection
IPS
Ransomware
Smishing
Least privilege
Web application firewall
IDS
Privilege escalation
Domain hijacking
Man-in-the-middle
Cybercrime
Threat hunting
Malvertising
SOC
Supply chain attack
Data breach
Exploit
Penetration testing
Malware
IAM
DDoS
Secure coding
Incident response
Social engineering
Authentication
Threat intelligence
Cyber hygiene
Digital forensics
Endpoint security
Zombie
Honeypot
Hashing
AES
Tokenization
Cloud security
Encryption
Worm
Phishing
APT
Risk assessment
Certificate