MobilePHIClickSecurityLegalRiskVulnerabilityProtectedThreatServerVishingIntranetVerifyRouterPersonalLoginDataBreachDeviceMaliciousAuthenticationTLS1.2IdentifyPIISecurityinformationand eventmanagement(SIEM)EmailDMZUsernameWi-FiFirewall2FA (Twofactorauthentication)SuspiciousEthernetInternetserviceprovider(ISP)Virtualprivatenetwork(VPN)PasswordIntrusiondetectionsystem(IDS)InformationBayshoreDecryptionResponsibilityIntrusionpreventionsystem(IPS)CertificateEncryptionMalwareDisableInternetPhishingWebsiteCyberWorkMobilePHIClickSecurityLegalRiskVulnerabilityProtectedThreatServerVishingIntranetVerifyRouterPersonalLoginDataBreachDeviceMaliciousAuthenticationTLS1.2IdentifyPIISecurityinformationand eventmanagement(SIEM)EmailDMZUsernameWi-FiFirewall2FA (Twofactorauthentication)SuspiciousEthernetInternetserviceprovider(ISP)Virtualprivatenetwork(VPN)PasswordIntrusiondetectionsystem(IDS)InformationBayshoreDecryptionResponsibilityIntrusionpreventionsystem(IPS)CertificateEncryptionMalwareDisableInternetPhishingWebsiteCyberWork

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Mobile
  2. PHI
  3. Click
  4. Security
  5. Legal
  6. Risk
  7. Vulnerability
  8. Protected
  9. Threat
  10. Server
  11. Vishing
  12. Intranet
  13. Verify
  14. Router
  15. Personal
  16. Login
  17. Data Breach
  18. Device
  19. Malicious
  20. Authentication
  21. TLS 1.2
  22. Identify
  23. PII
  24. Security information and event management (SIEM)
  25. Email
  26. DMZ
  27. Username
  28. Wi-Fi
  29. Firewall
  30. 2FA (Two factor authentication)
  31. Suspicious
  32. Ethernet
  33. Internet service provider (ISP)
  34. Virtual private network (VPN)
  35. Password
  36. Intrusion detection system (IDS)
  37. Information
  38. Bayshore
  39. Decryption
  40. Responsibility
  41. Intrusion prevention system (IPS)
  42. Certificate
  43. Encryption
  44. Malware
  45. Disable
  46. Internet
  47. Phishing
  48. Website
  49. Cyber
  50. Work