VerifyInternetIntrusiondetectionsystem(IDS)EmailDMZThreatTLS1.2VishingIntranetAuthenticationMobileWorkRouterDecryptionUsernameWi-FiWebsiteInternetserviceprovider(ISP)LegalCyberDeviceInformation2FA (Twofactorauthentication)PHIVirtualprivatenetwork(VPN)ResponsibilitySuspiciousPIICertificateRiskMaliciousServerProtectedVulnerabilityFirewallSecurityinformationand eventmanagement(SIEM)IdentifyDataBreachPasswordPhishingPersonalLoginClickBayshoreSecurityEthernetDisableMalwareEncryptionIntrusionpreventionsystem(IPS)VerifyInternetIntrusiondetectionsystem(IDS)EmailDMZThreatTLS1.2VishingIntranetAuthenticationMobileWorkRouterDecryptionUsernameWi-FiWebsiteInternetserviceprovider(ISP)LegalCyberDeviceInformation2FA (Twofactorauthentication)PHIVirtualprivatenetwork(VPN)ResponsibilitySuspiciousPIICertificateRiskMaliciousServerProtectedVulnerabilityFirewallSecurityinformationand eventmanagement(SIEM)IdentifyDataBreachPasswordPhishingPersonalLoginClickBayshoreSecurityEthernetDisableMalwareEncryptionIntrusionpreventionsystem(IPS)

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Verify
  2. Internet
  3. Intrusion detection system (IDS)
  4. Email
  5. DMZ
  6. Threat
  7. TLS 1.2
  8. Vishing
  9. Intranet
  10. Authentication
  11. Mobile
  12. Work
  13. Router
  14. Decryption
  15. Username
  16. Wi-Fi
  17. Website
  18. Internet service provider (ISP)
  19. Legal
  20. Cyber
  21. Device
  22. Information
  23. 2FA (Two factor authentication)
  24. PHI
  25. Virtual private network (VPN)
  26. Responsibility
  27. Suspicious
  28. PII
  29. Certificate
  30. Risk
  31. Malicious
  32. Server
  33. Protected
  34. Vulnerability
  35. Firewall
  36. Security information and event management (SIEM)
  37. Identify
  38. Data Breach
  39. Password
  40. Phishing
  41. Personal
  42. Login
  43. Click
  44. Bayshore
  45. Security
  46. Ethernet
  47. Disable
  48. Malware
  49. Encryption
  50. Intrusion prevention system (IPS)