ServiceDisruptionAttacksGray-HatHackersWarAttacksSTIXThreatVectorsRevengeAttacksThreatActorsAPTsZero-DayAttacksAttackSurfacesISACsNation-StateAttackersCorporateEspionageEthicalAttacksScriptKiddieShadowITFinancialGainAttacksBlack-HatHackersInsiderThreatVulnerabilityDatabasesOSINTPhilosophical-Political BeliefAttacksThreatIntelligenceDisruption-ChaosAttacksTTPsIoCsFree!BlackmailAttacksWhite-HatHackersDataExfiltrationAttacksPredictiveAnalysisClosed-SourceIntelligenceHacktivistsThreatMapsDarkWebOrganizedCrimeAttackersEspionageAttacksServiceDisruptionAttacksGray-HatHackersWarAttacksSTIXThreatVectorsRevengeAttacksThreatActorsAPTsZero-DayAttacksAttackSurfacesISACsNation-StateAttackersCorporateEspionageEthicalAttacksScriptKiddieShadowITFinancialGainAttacksBlack-HatHackersInsiderThreatVulnerabilityDatabasesOSINTPhilosophical-Political BeliefAttacksThreatIntelligenceDisruption-ChaosAttacksTTPsIoCsFree!BlackmailAttacksWhite-HatHackersDataExfiltrationAttacksPredictiveAnalysisClosed-SourceIntelligenceHacktivistsThreatMapsDarkWebOrganizedCrimeAttackersEspionageAttacks

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Service Disruption Attacks
  2. Gray-Hat Hackers
  3. War Attacks
  4. STIX
  5. Threat Vectors
  6. Revenge Attacks
  7. Threat Actors
  8. APTs
  9. Zero-Day Attacks
  10. Attack Surfaces
  11. ISACs
  12. Nation-State Attackers
  13. Corporate Espionage
  14. Ethical Attacks
  15. Script Kiddie
  16. Shadow IT
  17. Financial Gain Attacks
  18. Black-Hat Hackers
  19. Insider Threat
  20. Vulnerability Databases
  21. OSINT
  22. Philosophical-Political Belief Attacks
  23. Threat Intelligence
  24. Disruption-Chaos Attacks
  25. TTPs
  26. IoCs
  27. Free!
  28. Blackmail Attacks
  29. White-Hat Hackers
  30. Data Exfiltration Attacks
  31. Predictive Analysis
  32. Closed-Source Intelligence
  33. Hacktivists
  34. Threat Maps
  35. Dark Web
  36. Organized Crime Attackers
  37. Espionage Attacks