SIEM Cyberattack Blue Team Encryption Patch Management Public Key IoT Access Control SQL Injection DDoS Yellow Team Cross- Site Scripting Multi-Factor Authentication Firewall Social Engineering Session Hijacking Zero- Day Risk Assessment 2FA Credential Stuffing Backdoor Privilege Escalation Threat Intelligence SSL MITM Man- in-the- Middle Phishing Private Key Data Breach BYOD Zero Trust Password Antivirus Dark Web Botnet Shoulder Surfing Blacklisting Air Gap Digital Forensics Malware Trojan Social Media Risk Spyware Keylogger Insider Threat Security Token Sandbox VPN CISO Security Audit Red Team Incident Response TLC Patch Whitelisting Brute Force Rootkit Penetration Test Cyber Hygiene Security Awareness Clickjacking Security Policy Ransomware Exploit SIEM Cyberattack Blue Team Encryption Patch Management Public Key IoT Access Control SQL Injection DDoS Yellow Team Cross- Site Scripting Multi-Factor Authentication Firewall Social Engineering Session Hijacking Zero- Day Risk Assessment 2FA Credential Stuffing Backdoor Privilege Escalation Threat Intelligence SSL MITM Man- in-the- Middle Phishing Private Key Data Breach BYOD Zero Trust Password Antivirus Dark Web Botnet Shoulder Surfing Blacklisting Air Gap Digital Forensics Malware Trojan Social Media Risk Spyware Keylogger Insider Threat Security Token Sandbox VPN CISO Security Audit Red Team Incident Response TLC Patch Whitelisting Brute Force Rootkit Penetration Test Cyber Hygiene Security Awareness Clickjacking Security Policy Ransomware Exploit
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SIEM
Cyberattack
Blue Team
Encryption
Patch Management
Public Key
IoT
Access Control
SQL Injection
DDoS
Yellow Team
Cross-Site Scripting
Multi-Factor Authentication
Firewall
Social Engineering
Session Hijacking
Zero-Day
Risk Assessment
2FA
Credential Stuffing
Backdoor
Privilege Escalation
Threat Intelligence
SSL
MITM
Man-in-the-Middle
Phishing
Private Key
Data Breach
BYOD
Zero Trust
Password
Antivirus
Dark Web
Botnet
Shoulder Surfing
Blacklisting
Air Gap
Digital Forensics
Malware
Trojan
Social Media Risk
Spyware
Keylogger
Insider Threat
Security Token
Sandbox
VPN
CISO
Security Audit
Red Team
Incident Response
TLC
Patch
Whitelisting
Brute Force
Rootkit
Penetration Test
Cyber Hygiene
Security Awareness
Clickjacking
Security Policy
Ransomware
Exploit