DMZVishingInternetserviceprovider(ISP)VulnerabilityDecryptionUsernameSuspiciousMalwareIntrusiondetectionsystem(IDS)RiskWebsiteServerIntrusionpreventionsystem(IPS)LegalVerifyWorkIntranetMobilePersonalCertificatePhishingEthernetClickPIIEncryptionWi-FiDataBreachIdentifyVirtualprivatenetwork(VPN)CyberBayshoreInternetMaliciousEmailResponsibilityTLS1.2Securityinformationand eventmanagement(SIEM)DisableAuthenticationFirewallRouterThreatProtectedLogin2FA (Twofactorauthentication)PHISecurityDeviceInformationPasswordDMZVishingInternetserviceprovider(ISP)VulnerabilityDecryptionUsernameSuspiciousMalwareIntrusiondetectionsystem(IDS)RiskWebsiteServerIntrusionpreventionsystem(IPS)LegalVerifyWorkIntranetMobilePersonalCertificatePhishingEthernetClickPIIEncryptionWi-FiDataBreachIdentifyVirtualprivatenetwork(VPN)CyberBayshoreInternetMaliciousEmailResponsibilityTLS1.2Securityinformationand eventmanagement(SIEM)DisableAuthenticationFirewallRouterThreatProtectedLogin2FA (Twofactorauthentication)PHISecurityDeviceInformationPassword

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. DMZ
  2. Vishing
  3. Internet service provider (ISP)
  4. Vulnerability
  5. Decryption
  6. Username
  7. Suspicious
  8. Malware
  9. Intrusion detection system (IDS)
  10. Risk
  11. Website
  12. Server
  13. Intrusion prevention system (IPS)
  14. Legal
  15. Verify
  16. Work
  17. Intranet
  18. Mobile
  19. Personal
  20. Certificate
  21. Phishing
  22. Ethernet
  23. Click
  24. PII
  25. Encryption
  26. Wi-Fi
  27. Data Breach
  28. Identify
  29. Virtual private network (VPN)
  30. Cyber
  31. Bayshore
  32. Internet
  33. Malicious
  34. Email
  35. Responsibility
  36. TLS 1.2
  37. Security information and event management (SIEM)
  38. Disable
  39. Authentication
  40. Firewall
  41. Router
  42. Threat
  43. Protected
  44. Login
  45. 2FA (Two factor authentication)
  46. PHI
  47. Security
  48. Device
  49. Information
  50. Password