Bayshore Website Vishing 2FA (Two factor authentication) Virtual private network (VPN) Disable Suspicious Username Identify Login Legal Cyber Device Phishing Server Malware DMZ Information Security information and event management (SIEM) Malicious Intranet Password Vulnerability Router Ethernet Threat Risk Internet service provider (ISP) Mobile Data Breach Security Personal Click Authentication PII Email Intrusion detection system (IDS) PHI Work Certificate Encryption Wi-Fi Intrusion prevention system (IPS) Responsibility Firewall Verify Protected Internet Decryption TLS 1.2 Bayshore Website Vishing 2FA (Two factor authentication) Virtual private network (VPN) Disable Suspicious Username Identify Login Legal Cyber Device Phishing Server Malware DMZ Information Security information and event management (SIEM) Malicious Intranet Password Vulnerability Router Ethernet Threat Risk Internet service provider (ISP) Mobile Data Breach Security Personal Click Authentication PII Email Intrusion detection system (IDS) PHI Work Certificate Encryption Wi-Fi Intrusion prevention system (IPS) Responsibility Firewall Verify Protected Internet Decryption TLS 1.2
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Bayshore
Website
Vishing
2FA (Two factor authentication)
Virtual private network (VPN)
Disable
Suspicious
Username
Identify
Login
Legal
Cyber
Device
Phishing
Server
Malware
DMZ
Information
Security information and event management (SIEM)
Malicious
Intranet
Password
Vulnerability
Router
Ethernet
Threat
Risk
Internet service provider (ISP)
Mobile
Data Breach
Security
Personal
Click
Authentication
PII
Email
Intrusion detection system (IDS)
PHI
Work
Certificate
Encryption
Wi-Fi
Intrusion prevention system (IPS)
Responsibility
Firewall
Verify
Protected
Internet
Decryption
TLS 1.2