UsernameSecurityVulnerabilityPersonalWorkInternetserviceprovider(ISP)Wi-FiIdentifyPIIAuthenticationEthernetResponsibilityIntrusiondetectionsystem(IDS)Virtualprivatenetwork(VPN)WebsitePasswordBayshoreMalicious2FA (Twofactorauthentication)LegalInternetCyberDMZPhishingIntranetMalwareInformationThreatVishingPHIFirewallSecurityinformationand eventmanagement(SIEM)DeviceSuspiciousClickTLS1.2DisableEmailMobileIntrusionpreventionsystem(IPS)RouterProtectedLoginDataBreachDecryptionCertificateVerifyRiskServerEncryptionUsernameSecurityVulnerabilityPersonalWorkInternetserviceprovider(ISP)Wi-FiIdentifyPIIAuthenticationEthernetResponsibilityIntrusiondetectionsystem(IDS)Virtualprivatenetwork(VPN)WebsitePasswordBayshoreMalicious2FA (Twofactorauthentication)LegalInternetCyberDMZPhishingIntranetMalwareInformationThreatVishingPHIFirewallSecurityinformationand eventmanagement(SIEM)DeviceSuspiciousClickTLS1.2DisableEmailMobileIntrusionpreventionsystem(IPS)RouterProtectedLoginDataBreachDecryptionCertificateVerifyRiskServerEncryption

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Username
  2. Security
  3. Vulnerability
  4. Personal
  5. Work
  6. Internet service provider (ISP)
  7. Wi-Fi
  8. Identify
  9. PII
  10. Authentication
  11. Ethernet
  12. Responsibility
  13. Intrusion detection system (IDS)
  14. Virtual private network (VPN)
  15. Website
  16. Password
  17. Bayshore
  18. Malicious
  19. 2FA (Two factor authentication)
  20. Legal
  21. Internet
  22. Cyber
  23. DMZ
  24. Phishing
  25. Intranet
  26. Malware
  27. Information
  28. Threat
  29. Vishing
  30. PHI
  31. Firewall
  32. Security information and event management (SIEM)
  33. Device
  34. Suspicious
  35. Click
  36. TLS 1.2
  37. Disable
  38. Email
  39. Mobile
  40. Intrusion prevention system (IPS)
  41. Router
  42. Protected
  43. Login
  44. Data Breach
  45. Decryption
  46. Certificate
  47. Verify
  48. Risk
  49. Server
  50. Encryption