TLS1.2RouterAuthenticationVirtualprivatenetwork(VPN)DataBreachDisablePhishingLegalFirewallMobileSecurityinformationand eventmanagement(SIEM)SecurityProtectedDMZDecryptionVulnerabilityWorkEncryptionBayshoreCyberInternetserviceprovider(ISP)EmailDeviceIntrusiondetectionsystem(IDS)VishingServerIntrusionpreventionsystem(IPS)ResponsibilityInternet2FA (Twofactorauthentication)ClickThreatWi-FiMalwareMaliciousEthernetRiskPHIInformationCertificateUsernamePasswordPersonalIntranetPIILoginWebsiteSuspiciousVerifyIdentifyTLS1.2RouterAuthenticationVirtualprivatenetwork(VPN)DataBreachDisablePhishingLegalFirewallMobileSecurityinformationand eventmanagement(SIEM)SecurityProtectedDMZDecryptionVulnerabilityWorkEncryptionBayshoreCyberInternetserviceprovider(ISP)EmailDeviceIntrusiondetectionsystem(IDS)VishingServerIntrusionpreventionsystem(IPS)ResponsibilityInternet2FA (Twofactorauthentication)ClickThreatWi-FiMalwareMaliciousEthernetRiskPHIInformationCertificateUsernamePasswordPersonalIntranetPIILoginWebsiteSuspiciousVerifyIdentify

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. TLS 1.2
  2. Router
  3. Authentication
  4. Virtual private network (VPN)
  5. Data Breach
  6. Disable
  7. Phishing
  8. Legal
  9. Firewall
  10. Mobile
  11. Security information and event management (SIEM)
  12. Security
  13. Protected
  14. DMZ
  15. Decryption
  16. Vulnerability
  17. Work
  18. Encryption
  19. Bayshore
  20. Cyber
  21. Internet service provider (ISP)
  22. Email
  23. Device
  24. Intrusion detection system (IDS)
  25. Vishing
  26. Server
  27. Intrusion prevention system (IPS)
  28. Responsibility
  29. Internet
  30. 2FA (Two factor authentication)
  31. Click
  32. Threat
  33. Wi-Fi
  34. Malware
  35. Malicious
  36. Ethernet
  37. Risk
  38. PHI
  39. Information
  40. Certificate
  41. Username
  42. Password
  43. Personal
  44. Intranet
  45. PII
  46. Login
  47. Website
  48. Suspicious
  49. Verify
  50. Identify