AttackSurfacesISACsServiceDisruptionAttacksFinancialGainAttacksTTPsScriptKiddieWhite-HatHackersHacktivistsThreatVectorsGray-HatHackersPhilosophical-Political BeliefAttacksFree!RevengeAttacksCorporateEspionageClosed-SourceIntelligenceIoCsVulnerabilityDatabasesEthicalAttacksShadowITNation-StateAttackersDataExfiltrationAttacksDarkWebOSINTDisruption-ChaosAttacksEspionageAttacksAPTsOrganizedCrimeAttackersThreatIntelligenceInsiderThreatPredictiveAnalysisZero-DayAttacksBlack-HatHackersThreatMapsSTIXWarAttacksThreatActorsBlackmailAttacksAttackSurfacesISACsServiceDisruptionAttacksFinancialGainAttacksTTPsScriptKiddieWhite-HatHackersHacktivistsThreatVectorsGray-HatHackersPhilosophical-Political BeliefAttacksFree!RevengeAttacksCorporateEspionageClosed-SourceIntelligenceIoCsVulnerabilityDatabasesEthicalAttacksShadowITNation-StateAttackersDataExfiltrationAttacksDarkWebOSINTDisruption-ChaosAttacksEspionageAttacksAPTsOrganizedCrimeAttackersThreatIntelligenceInsiderThreatPredictiveAnalysisZero-DayAttacksBlack-HatHackersThreatMapsSTIXWarAttacksThreatActorsBlackmailAttacks

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Attack Surfaces
  2. ISACs
  3. Service Disruption Attacks
  4. Financial Gain Attacks
  5. TTPs
  6. Script Kiddie
  7. White-Hat Hackers
  8. Hacktivists
  9. Threat Vectors
  10. Gray-Hat Hackers
  11. Philosophical-Political Belief Attacks
  12. Free!
  13. Revenge Attacks
  14. Corporate Espionage
  15. Closed-Source Intelligence
  16. IoCs
  17. Vulnerability Databases
  18. Ethical Attacks
  19. Shadow IT
  20. Nation-State Attackers
  21. Data Exfiltration Attacks
  22. Dark Web
  23. OSINT
  24. Disruption-Chaos Attacks
  25. Espionage Attacks
  26. APTs
  27. Organized Crime Attackers
  28. Threat Intelligence
  29. Insider Threat
  30. Predictive Analysis
  31. Zero-Day Attacks
  32. Black-Hat Hackers
  33. Threat Maps
  34. STIX
  35. War Attacks
  36. Threat Actors
  37. Blackmail Attacks