Insider threat Ransomware Penetration testing Zombie SIEM Backup UAC Tokenization Certificate Asset management Least privilege DDoS Digital footprint Incident response Risk assessment MFA Vulnerability Social engineering Botnet APT Man- in-the- middle Secure coding Phishing Spoofing White hat Proxy IDS Cryptography Firewall Worm Hashing Data breach Malvertising SOC EDR Adware Honeypot Free! Smishing Web application firewall Brute force Cloud security Cipher IPS AES Authentication Cyberattack Malware Zero- day SQL injection Domain hijacking Supply chain attack C2 server Digital forensics Privilege escalation Threat hunting Cyber hygiene Endpoint security Trojan Reverse engineering VPN Threat intelligence Security awareness Zero trust Exploit Encryption Spyware Decryption Cybercrime Threat modeling Antivirus IAM OSINT Insider threat Ransomware Penetration testing Zombie SIEM Backup UAC Tokenization Certificate Asset management Least privilege DDoS Digital footprint Incident response Risk assessment MFA Vulnerability Social engineering Botnet APT Man- in-the- middle Secure coding Phishing Spoofing White hat Proxy IDS Cryptography Firewall Worm Hashing Data breach Malvertising SOC EDR Adware Honeypot Free! Smishing Web application firewall Brute force Cloud security Cipher IPS AES Authentication Cyberattack Malware Zero- day SQL injection Domain hijacking Supply chain attack C2 server Digital forensics Privilege escalation Threat hunting Cyber hygiene Endpoint security Trojan Reverse engineering VPN Threat intelligence Security awareness Zero trust Exploit Encryption Spyware Decryption Cybercrime Threat modeling Antivirus IAM OSINT
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Insider threat
Ransomware
Penetration testing
Zombie
SIEM
Backup
UAC
Tokenization
Certificate
Asset management
Least privilege
DDoS
Digital footprint
Incident response
Risk assessment
MFA
Vulnerability
Social engineering
Botnet
APT
Man-in-the-middle
Secure coding
Phishing
Spoofing
White hat
Proxy
IDS
Cryptography
Firewall
Worm
Hashing
Data breach
Malvertising
SOC
EDR
Adware
Honeypot
Free!
Smishing
Web application firewall
Brute force
Cloud security
Cipher
IPS
AES
Authentication
Cyberattack
Malware
Zero-day
SQL injection
Domain hijacking
Supply chain attack
C2 server
Digital forensics
Privilege escalation
Threat hunting
Cyber hygiene
Endpoint security
Trojan
Reverse engineering
VPN
Threat intelligence
Security awareness
Zero trust
Exploit
Encryption
Spyware
Decryption
Cybercrime
Threat modeling
Antivirus
IAM
OSINT