top of page
Search

Cybersecurity Bingo

So many different buzzwords that it can make for a fun game of Bingo.

Guidelines and Considerations are as follows:

​Phishing

Spear phishing or regular works

Switch/Router

​Switch or router-type infrastructure. Hub would also be a valid entry

Firewall

A vendor brand such as Palo-Alto, or Cisco works as long as it is within the context of a firewall

Escalate

The exact word needs to be used

Pen-test

Pen-testing or red-team can be considered valid entries

D/DoS

"Distributed denial of service" or just "denial of service" are valid entries

​Tiger-team

Should be used singular or plural

Malware

Malware, Ransomware, or the type of actual name of the malware are valid to complete this square

​Bandwidth

As it refers to network traffic, not the circumference of musicians

Actor

Likely to be used in the sense of threat actor, not the actor I saw on TV last night

​Nation state

Must be both words used (Nation-state) to complete the square. Using 'nation' on its own and then later using 'state' doesn't count

AI/Machine Learning

Any variants of Artificial intelligence or machine learning are valid entries, this also includes terms such as supervised or unsupervised neural networks

Free Space

Doesn't need to be said, but if someone says it then you know that you're on a roll with this group!

Intel

Intended in the context of threat-intelligence, not the computer chip maker. However, you could still complete the square and argue the process

Policy

​Policy, as it relates to business or rule policy, is fine. You may want to determine ahead of time if anything from governance is allowed to complete this square, such as NIST, ISO, etc.

Blocked

Blocking is also a valid entry and may be used with a high scoring sentence such as 'I have blocked the threat actor'

Proxy

The idea of proxying network connections, not having someone fill out your bingo card by proxy

Network

As it relates to communication on the organization's TCP/IP network, whether intranet or internet-based. If used in the context of neural network then you should complete the AI/Machine Learning square

Rule

Typically related to a threat signature or firewall that governs how future occurrences are remediated

Recon

Recon or Reconnaissance is good to complete this square. However, recognizance or recognition are not

Ticket

Ideally related to a bug tracking system, trouble ticketing system, or service ticketing system. If someone proclaims 'that's the ticket!' then you probably deserve to complete the square just for being in the same room as that person

​Threat

Ideally related to network or software threats occurring within the organization. It could also be used in the context of an insider threat, which hopefully isn't anyone in the room with you right now

DNS

Pretty straightforward reference to the internet domain name servers, and likely used as part of a sentence, such as 'I did a DNS lookup on the domain'

Logs

Not of the tree kind, but of the kind typically aggregated from Windows, Linux, Active-Directory, Firewalls, or other such sources. The term 'Syslog' would be acceptable to complete this square

Sorry, was on mute

Something you're likely to hear on any internet-based communication software, such as Zoom, Webex, GoToMeeting, etc. Hopefully, never followed by the phrase "I'm not a cat"

​SEO

Not on the actual bingo board, but an honorable mention here for my blatant attempt to get various cybersecurity keywords indexed



Subscribe and be the first to know!

Thanks for subscribing!

This form no longer accepts submissions.

bottom of page