LegalVishingClickMalwareTLS1.2FirewallWebsiteDeviceBayshoreEncryptionIntrusionpreventionsystem(IPS)RiskUsernameInternetVulnerabilityWi-FiPHIServerDecryptionRouterWorkThreatIntrusiondetectionsystem(IDS)AuthenticationSuspiciousMobilePasswordResponsibilityPersonalEmailCyberProtectedMaliciousSecurityinformationand eventmanagement(SIEM)IdentifyDataBreachDisableSecurityEthernetCertificatePIIVerifyInformation2FA (Twofactorauthentication)LoginVirtualprivatenetwork(VPN)Internetserviceprovider(ISP)IntranetDMZPhishingLegalVishingClickMalwareTLS1.2FirewallWebsiteDeviceBayshoreEncryptionIntrusionpreventionsystem(IPS)RiskUsernameInternetVulnerabilityWi-FiPHIServerDecryptionRouterWorkThreatIntrusiondetectionsystem(IDS)AuthenticationSuspiciousMobilePasswordResponsibilityPersonalEmailCyberProtectedMaliciousSecurityinformationand eventmanagement(SIEM)IdentifyDataBreachDisableSecurityEthernetCertificatePIIVerifyInformation2FA (Twofactorauthentication)LoginVirtualprivatenetwork(VPN)Internetserviceprovider(ISP)IntranetDMZPhishing

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Legal
  2. Vishing
  3. Click
  4. Malware
  5. TLS 1.2
  6. Firewall
  7. Website
  8. Device
  9. Bayshore
  10. Encryption
  11. Intrusion prevention system (IPS)
  12. Risk
  13. Username
  14. Internet
  15. Vulnerability
  16. Wi-Fi
  17. PHI
  18. Server
  19. Decryption
  20. Router
  21. Work
  22. Threat
  23. Intrusion detection system (IDS)
  24. Authentication
  25. Suspicious
  26. Mobile
  27. Password
  28. Responsibility
  29. Personal
  30. Email
  31. Cyber
  32. Protected
  33. Malicious
  34. Security information and event management (SIEM)
  35. Identify
  36. Data Breach
  37. Disable
  38. Security
  39. Ethernet
  40. Certificate
  41. PII
  42. Verify
  43. Information
  44. 2FA (Two factor authentication)
  45. Login
  46. Virtual private network (VPN)
  47. Internet service provider (ISP)
  48. Intranet
  49. DMZ
  50. Phishing