Username Security Vulnerability Personal Work Internet service provider (ISP) Wi-Fi Identify PII Authentication Ethernet Responsibility Intrusion detection system (IDS) Virtual private network (VPN) Website Password Bayshore Malicious 2FA (Two factor authentication) Legal Internet Cyber DMZ Phishing Intranet Malware Information Threat Vishing PHI Firewall Security information and event management (SIEM) Device Suspicious Click TLS 1.2 Disable Email Mobile Intrusion prevention system (IPS) Router Protected Login Data Breach Decryption Certificate Verify Risk Server Encryption Username Security Vulnerability Personal Work Internet service provider (ISP) Wi-Fi Identify PII Authentication Ethernet Responsibility Intrusion detection system (IDS) Virtual private network (VPN) Website Password Bayshore Malicious 2FA (Two factor authentication) Legal Internet Cyber DMZ Phishing Intranet Malware Information Threat Vishing PHI Firewall Security information and event management (SIEM) Device Suspicious Click TLS 1.2 Disable Email Mobile Intrusion prevention system (IPS) Router Protected Login Data Breach Decryption Certificate Verify Risk Server Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Username
Security
Vulnerability
Personal
Work
Internet service provider (ISP)
Wi-Fi
Identify
PII
Authentication
Ethernet
Responsibility
Intrusion detection system (IDS)
Virtual private network (VPN)
Website
Password
Bayshore
Malicious
2FA (Two factor authentication)
Legal
Internet
Cyber
DMZ
Phishing
Intranet
Malware
Information
Threat
Vishing
PHI
Firewall
Security information and event management (SIEM)
Device
Suspicious
Click
TLS 1.2
Disable
Email
Mobile
Intrusion prevention system (IPS)
Router
Protected
Login
Data Breach
Decryption
Certificate
Verify
Risk
Server
Encryption