EspionageAttacksShadowITCorporateEspionageOrganizedCrimeAttackersAPTsInsiderThreatScriptKiddieWarAttacksDataExfiltrationAttacksBlack-HatHackersIoCsZero-DayAttacksNation-StateAttackersGray-HatHackersHacktivistsServiceDisruptionAttacksISACsClosed-SourceIntelligenceThreatActorsDarkWebThreatMapsFinancialGainAttacksPhilosophical-Political BeliefAttacksFree!EthicalAttacksAttackSurfacesPredictiveAnalysisWhite-HatHackersThreatIntelligenceBlackmailAttacksRevengeAttacksTTPsThreatVectorsSTIXOSINTDisruption-ChaosAttacksVulnerabilityDatabasesEspionageAttacksShadowITCorporateEspionageOrganizedCrimeAttackersAPTsInsiderThreatScriptKiddieWarAttacksDataExfiltrationAttacksBlack-HatHackersIoCsZero-DayAttacksNation-StateAttackersGray-HatHackersHacktivistsServiceDisruptionAttacksISACsClosed-SourceIntelligenceThreatActorsDarkWebThreatMapsFinancialGainAttacksPhilosophical-Political BeliefAttacksFree!EthicalAttacksAttackSurfacesPredictiveAnalysisWhite-HatHackersThreatIntelligenceBlackmailAttacksRevengeAttacksTTPsThreatVectorsSTIXOSINTDisruption-ChaosAttacksVulnerabilityDatabases

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Espionage Attacks
  2. Shadow IT
  3. Corporate Espionage
  4. Organized Crime Attackers
  5. APTs
  6. Insider Threat
  7. Script Kiddie
  8. War Attacks
  9. Data Exfiltration Attacks
  10. Black-Hat Hackers
  11. IoCs
  12. Zero-Day Attacks
  13. Nation-State Attackers
  14. Gray-Hat Hackers
  15. Hacktivists
  16. Service Disruption Attacks
  17. ISACs
  18. Closed-Source Intelligence
  19. Threat Actors
  20. Dark Web
  21. Threat Maps
  22. Financial Gain Attacks
  23. Philosophical-Political Belief Attacks
  24. Free!
  25. Ethical Attacks
  26. Attack Surfaces
  27. Predictive Analysis
  28. White-Hat Hackers
  29. Threat Intelligence
  30. Blackmail Attacks
  31. Revenge Attacks
  32. TTPs
  33. Threat Vectors
  34. STIX
  35. OSINT
  36. Disruption-Chaos Attacks
  37. Vulnerability Databases