BayshoreWebsiteVishing2FA (Twofactorauthentication)Virtualprivatenetwork(VPN)DisableSuspiciousUsernameIdentifyLoginLegalCyberDevicePhishingServerMalwareDMZInformationSecurityinformationand eventmanagement(SIEM)MaliciousIntranetPasswordVulnerabilityRouterEthernetThreatRiskInternetserviceprovider(ISP)MobileDataBreachSecurityPersonalClickAuthenticationPIIEmailIntrusiondetectionsystem(IDS)PHIWorkCertificateEncryptionWi-FiIntrusionpreventionsystem(IPS)ResponsibilityFirewallVerifyProtectedInternetDecryptionTLS1.2BayshoreWebsiteVishing2FA (Twofactorauthentication)Virtualprivatenetwork(VPN)DisableSuspiciousUsernameIdentifyLoginLegalCyberDevicePhishingServerMalwareDMZInformationSecurityinformationand eventmanagement(SIEM)MaliciousIntranetPasswordVulnerabilityRouterEthernetThreatRiskInternetserviceprovider(ISP)MobileDataBreachSecurityPersonalClickAuthenticationPIIEmailIntrusiondetectionsystem(IDS)PHIWorkCertificateEncryptionWi-FiIntrusionpreventionsystem(IPS)ResponsibilityFirewallVerifyProtectedInternetDecryptionTLS1.2

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Bayshore
  2. Website
  3. Vishing
  4. 2FA (Two factor authentication)
  5. Virtual private network (VPN)
  6. Disable
  7. Suspicious
  8. Username
  9. Identify
  10. Login
  11. Legal
  12. Cyber
  13. Device
  14. Phishing
  15. Server
  16. Malware
  17. DMZ
  18. Information
  19. Security information and event management (SIEM)
  20. Malicious
  21. Intranet
  22. Password
  23. Vulnerability
  24. Router
  25. Ethernet
  26. Threat
  27. Risk
  28. Internet service provider (ISP)
  29. Mobile
  30. Data Breach
  31. Security
  32. Personal
  33. Click
  34. Authentication
  35. PII
  36. Email
  37. Intrusion detection system (IDS)
  38. PHI
  39. Work
  40. Certificate
  41. Encryption
  42. Wi-Fi
  43. Intrusion prevention system (IPS)
  44. Responsibility
  45. Firewall
  46. Verify
  47. Protected
  48. Internet
  49. Decryption
  50. TLS 1.2