EthernetDisableSuspiciousTLS1.2ProtectedMaliciousAuthenticationWi-FiVishingLoginDataBreachThreatWebsiteCyberInternetserviceprovider(ISP)IntranetPhishingMalwareVirtualprivatenetwork(VPN)InformationPasswordSecurityinformationand eventmanagement(SIEM)RiskDecryptionEncryptionRouterFirewallWorkPHILegalUsernamePIIVerifyIntrusiondetectionsystem(IDS)BayshoreDMZSecurityServerPersonalVulnerabilityClickCertificateMobileEmailIdentifyResponsibilityDevice2FA (Twofactorauthentication)Intrusionpreventionsystem(IPS)InternetEthernetDisableSuspiciousTLS1.2ProtectedMaliciousAuthenticationWi-FiVishingLoginDataBreachThreatWebsiteCyberInternetserviceprovider(ISP)IntranetPhishingMalwareVirtualprivatenetwork(VPN)InformationPasswordSecurityinformationand eventmanagement(SIEM)RiskDecryptionEncryptionRouterFirewallWorkPHILegalUsernamePIIVerifyIntrusiondetectionsystem(IDS)BayshoreDMZSecurityServerPersonalVulnerabilityClickCertificateMobileEmailIdentifyResponsibilityDevice2FA (Twofactorauthentication)Intrusionpreventionsystem(IPS)Internet

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Ethernet
  2. Disable
  3. Suspicious
  4. TLS 1.2
  5. Protected
  6. Malicious
  7. Authentication
  8. Wi-Fi
  9. Vishing
  10. Login
  11. Data Breach
  12. Threat
  13. Website
  14. Cyber
  15. Internet service provider (ISP)
  16. Intranet
  17. Phishing
  18. Malware
  19. Virtual private network (VPN)
  20. Information
  21. Password
  22. Security information and event management (SIEM)
  23. Risk
  24. Decryption
  25. Encryption
  26. Router
  27. Firewall
  28. Work
  29. PHI
  30. Legal
  31. Username
  32. PII
  33. Verify
  34. Intrusion detection system (IDS)
  35. Bayshore
  36. DMZ
  37. Security
  38. Server
  39. Personal
  40. Vulnerability
  41. Click
  42. Certificate
  43. Mobile
  44. Email
  45. Identify
  46. Responsibility
  47. Device
  48. 2FA (Two factor authentication)
  49. Intrusion prevention system (IPS)
  50. Internet