SQL Injection Exploit Penetration Testing Patch Management Cybersecurity Policy Botnet Network Security Brute Force Attack Authorization Social Engineering VPN Cyber Hygiene SSL/TLS Cross- Site Scripting DDoS Attack Antivirus Public Key Malware Secure Socket Digital Certificate Firewall Access Control Cyber Threat Intrusion Prevention Risk Assessment Security Awareness Two-Factor Authentication Cyber Attack Incident Response Data Breach Trojan Horse Security Patch Intrusion Detection Phishing Ransomware Zero- Day Encryption Authentication Session Hijacking Private Key Keylogger Security Audit Rootkit Man- in-the- Middle Sandboxing Security Token Security Protocol Security Update Security Vulnerability Spyware SQL Injection Exploit Penetration Testing Patch Management Cybersecurity Policy Botnet Network Security Brute Force Attack Authorization Social Engineering VPN Cyber Hygiene SSL/TLS Cross- Site Scripting DDoS Attack Antivirus Public Key Malware Secure Socket Digital Certificate Firewall Access Control Cyber Threat Intrusion Prevention Risk Assessment Security Awareness Two-Factor Authentication Cyber Attack Incident Response Data Breach Trojan Horse Security Patch Intrusion Detection Phishing Ransomware Zero- Day Encryption Authentication Session Hijacking Private Key Keylogger Security Audit Rootkit Man- in-the- Middle Sandboxing Security Token Security Protocol Security Update Security Vulnerability Spyware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SQL Injection
Exploit
Penetration Testing
Patch Management
Cybersecurity Policy
Botnet
Network Security
Brute Force Attack
Authorization
Social Engineering
VPN
Cyber Hygiene
SSL/TLS
Cross-Site Scripting
DDoS Attack
Antivirus
Public Key
Malware
Secure Socket
Digital Certificate
Firewall
Access Control
Cyber Threat
Intrusion Prevention
Risk Assessment
Security Awareness
Two-Factor Authentication
Cyber Attack
Incident Response
Data Breach
Trojan Horse
Security Patch
Intrusion Detection
Phishing
Ransomware
Zero-Day
Encryption
Authentication
Session Hijacking
Private Key
Keylogger
Security Audit
Rootkit
Man-in-the-Middle
Sandboxing
Security Token
Security Protocol
Security Update
Security Vulnerability
Spyware