AttackSurfacesFinancialGainAttacksBlack-HatHackersWhite-HatHackersBlackmailAttacksEspionageAttacksThreatMapsGray-HatHackersEthicalAttacksDarkWebServiceDisruptionAttacksThreatActorsInsiderThreatOSINTHacktivistsScriptKiddieRevengeAttacksWarAttacksPhilosophical-Political BeliefAttacksThreatVectorsSTIXNation-StateAttackersAPTsDataExfiltrationAttacksISACsCorporateEspionageTTPsIoCsDisruption-ChaosAttacksVulnerabilityDatabasesZero-DayAttacksOrganizedCrimeAttackersPredictiveAnalysisFree!ThreatIntelligenceShadowITClosed-SourceIntelligenceAttackSurfacesFinancialGainAttacksBlack-HatHackersWhite-HatHackersBlackmailAttacksEspionageAttacksThreatMapsGray-HatHackersEthicalAttacksDarkWebServiceDisruptionAttacksThreatActorsInsiderThreatOSINTHacktivistsScriptKiddieRevengeAttacksWarAttacksPhilosophical-Political BeliefAttacksThreatVectorsSTIXNation-StateAttackersAPTsDataExfiltrationAttacksISACsCorporateEspionageTTPsIoCsDisruption-ChaosAttacksVulnerabilityDatabasesZero-DayAttacksOrganizedCrimeAttackersPredictiveAnalysisFree!ThreatIntelligenceShadowITClosed-SourceIntelligence

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Attack Surfaces
  2. Financial Gain Attacks
  3. Black-Hat Hackers
  4. White-Hat Hackers
  5. Blackmail Attacks
  6. Espionage Attacks
  7. Threat Maps
  8. Gray-Hat Hackers
  9. Ethical Attacks
  10. Dark Web
  11. Service Disruption Attacks
  12. Threat Actors
  13. Insider Threat
  14. OSINT
  15. Hacktivists
  16. Script Kiddie
  17. Revenge Attacks
  18. War Attacks
  19. Philosophical-Political Belief Attacks
  20. Threat Vectors
  21. STIX
  22. Nation-State Attackers
  23. APTs
  24. Data Exfiltration Attacks
  25. ISACs
  26. Corporate Espionage
  27. TTPs
  28. IoCs
  29. Disruption-Chaos Attacks
  30. Vulnerability Databases
  31. Zero-Day Attacks
  32. Organized Crime Attackers
  33. Predictive Analysis
  34. Free!
  35. Threat Intelligence
  36. Shadow IT
  37. Closed-Source Intelligence