ScriptKiddieDarkWebISACsThreatActorsBlack-HatHackersNation-StateAttackersWarAttacksFree!OrganizedCrimeAttackersIoCsWhite-HatHackersEspionageAttacksPhilosophical-Political BeliefAttacksSTIXTTPsBlackmailAttacksThreatIntelligenceCorporateEspionageAPTsShadowITClosed-SourceIntelligenceAttackSurfacesGray-HatHackersVulnerabilityDatabasesServiceDisruptionAttacksThreatVectorsFinancialGainAttacksZero-DayAttacksRevengeAttacksEthicalAttacksDisruption-ChaosAttacksPredictiveAnalysisOSINTInsiderThreatThreatMapsDataExfiltrationAttacksHacktivistsScriptKiddieDarkWebISACsThreatActorsBlack-HatHackersNation-StateAttackersWarAttacksFree!OrganizedCrimeAttackersIoCsWhite-HatHackersEspionageAttacksPhilosophical-Political BeliefAttacksSTIXTTPsBlackmailAttacksThreatIntelligenceCorporateEspionageAPTsShadowITClosed-SourceIntelligenceAttackSurfacesGray-HatHackersVulnerabilityDatabasesServiceDisruptionAttacksThreatVectorsFinancialGainAttacksZero-DayAttacksRevengeAttacksEthicalAttacksDisruption-ChaosAttacksPredictiveAnalysisOSINTInsiderThreatThreatMapsDataExfiltrationAttacksHacktivists

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Script Kiddie
  2. Dark Web
  3. ISACs
  4. Threat Actors
  5. Black-Hat Hackers
  6. Nation-State Attackers
  7. War Attacks
  8. Free!
  9. Organized Crime Attackers
  10. IoCs
  11. White-Hat Hackers
  12. Espionage Attacks
  13. Philosophical-Political Belief Attacks
  14. STIX
  15. TTPs
  16. Blackmail Attacks
  17. Threat Intelligence
  18. Corporate Espionage
  19. APTs
  20. Shadow IT
  21. Closed-Source Intelligence
  22. Attack Surfaces
  23. Gray-Hat Hackers
  24. Vulnerability Databases
  25. Service Disruption Attacks
  26. Threat Vectors
  27. Financial Gain Attacks
  28. Zero-Day Attacks
  29. Revenge Attacks
  30. Ethical Attacks
  31. Disruption-Chaos Attacks
  32. Predictive Analysis
  33. OSINT
  34. Insider Threat
  35. Threat Maps
  36. Data Exfiltration Attacks
  37. Hacktivists