UsernameRouterInternetPHIDecryptionVerifyPasswordWi-FiEthernetIntrusionpreventionsystem(IPS)MaliciousCyberWebsiteInternetserviceprovider(ISP)PhishingLoginThreatMobileTLS1.2ClickEncryptionVirtualprivatenetwork(VPN)DMZFirewallIntranetSecurityEmailBayshoreSuspiciousServerSecurityinformationand eventmanagement(SIEM)DataBreach2FA (Twofactorauthentication)CertificateAuthenticationWorkProtectedIntrusiondetectionsystem(IDS)PersonalVishingPIIDeviceVulnerabilityInformationRiskResponsibilityDisableMalwareIdentifyLegalUsernameRouterInternetPHIDecryptionVerifyPasswordWi-FiEthernetIntrusionpreventionsystem(IPS)MaliciousCyberWebsiteInternetserviceprovider(ISP)PhishingLoginThreatMobileTLS1.2ClickEncryptionVirtualprivatenetwork(VPN)DMZFirewallIntranetSecurityEmailBayshoreSuspiciousServerSecurityinformationand eventmanagement(SIEM)DataBreach2FA (Twofactorauthentication)CertificateAuthenticationWorkProtectedIntrusiondetectionsystem(IDS)PersonalVishingPIIDeviceVulnerabilityInformationRiskResponsibilityDisableMalwareIdentifyLegal

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Username
  2. Router
  3. Internet
  4. PHI
  5. Decryption
  6. Verify
  7. Password
  8. Wi-Fi
  9. Ethernet
  10. Intrusion prevention system (IPS)
  11. Malicious
  12. Cyber
  13. Website
  14. Internet service provider (ISP)
  15. Phishing
  16. Login
  17. Threat
  18. Mobile
  19. TLS 1.2
  20. Click
  21. Encryption
  22. Virtual private network (VPN)
  23. DMZ
  24. Firewall
  25. Intranet
  26. Security
  27. Email
  28. Bayshore
  29. Suspicious
  30. Server
  31. Security information and event management (SIEM)
  32. Data Breach
  33. 2FA (Two factor authentication)
  34. Certificate
  35. Authentication
  36. Work
  37. Protected
  38. Intrusion detection system (IDS)
  39. Personal
  40. Vishing
  41. PII
  42. Device
  43. Vulnerability
  44. Information
  45. Risk
  46. Responsibility
  47. Disable
  48. Malware
  49. Identify
  50. Legal