InformationPersonalWebsiteServerResponsibilityTLS1.2CertificateRouterProtectedSecurityIntranetDataBreachVulnerabilityPHIEmailVerifyDeviceEthernetVishingMobileBayshorePIILegalEncryptionDisableWorkSecurityinformationand eventmanagement(SIEM)CyberInternetUsernameMalwareDecryptionWi-FiPasswordIntrusionpreventionsystem(IPS)Risk2FA (Twofactorauthentication)Internetserviceprovider(ISP)FirewallSuspiciousMaliciousDMZLoginIntrusiondetectionsystem(IDS)ThreatAuthenticationIdentifyPhishingClickVirtualprivatenetwork(VPN)InformationPersonalWebsiteServerResponsibilityTLS1.2CertificateRouterProtectedSecurityIntranetDataBreachVulnerabilityPHIEmailVerifyDeviceEthernetVishingMobileBayshorePIILegalEncryptionDisableWorkSecurityinformationand eventmanagement(SIEM)CyberInternetUsernameMalwareDecryptionWi-FiPasswordIntrusionpreventionsystem(IPS)Risk2FA (Twofactorauthentication)Internetserviceprovider(ISP)FirewallSuspiciousMaliciousDMZLoginIntrusiondetectionsystem(IDS)ThreatAuthenticationIdentifyPhishingClickVirtualprivatenetwork(VPN)

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Information
  2. Personal
  3. Website
  4. Server
  5. Responsibility
  6. TLS 1.2
  7. Certificate
  8. Router
  9. Protected
  10. Security
  11. Intranet
  12. Data Breach
  13. Vulnerability
  14. PHI
  15. Email
  16. Verify
  17. Device
  18. Ethernet
  19. Vishing
  20. Mobile
  21. Bayshore
  22. PII
  23. Legal
  24. Encryption
  25. Disable
  26. Work
  27. Security information and event management (SIEM)
  28. Cyber
  29. Internet
  30. Username
  31. Malware
  32. Decryption
  33. Wi-Fi
  34. Password
  35. Intrusion prevention system (IPS)
  36. Risk
  37. 2FA (Two factor authentication)
  38. Internet service provider (ISP)
  39. Firewall
  40. Suspicious
  41. Malicious
  42. DMZ
  43. Login
  44. Intrusion detection system (IDS)
  45. Threat
  46. Authentication
  47. Identify
  48. Phishing
  49. Click
  50. Virtual private network (VPN)