MaliciousMobileSuspiciousPIILoginRiskFirewallPhishingIntrusiondetectionsystem(IDS)MalwareBayshoreUsernameWebsiteVishingResponsibilityInternetCyber2FA (Twofactorauthentication)EncryptionSecurityAuthenticationRouterDeviceWi-FiIntranetTLS1.2InformationDataBreachWorkIdentifyIntrusionpreventionsystem(IPS)VulnerabilityPersonalPasswordDecryptionSecurityinformationand eventmanagement(SIEM)PHIVerifyVirtualprivatenetwork(VPN)DMZCertificateLegalEthernetInternetserviceprovider(ISP)ServerClickProtectedEmailThreatDisableMaliciousMobileSuspiciousPIILoginRiskFirewallPhishingIntrusiondetectionsystem(IDS)MalwareBayshoreUsernameWebsiteVishingResponsibilityInternetCyber2FA (Twofactorauthentication)EncryptionSecurityAuthenticationRouterDeviceWi-FiIntranetTLS1.2InformationDataBreachWorkIdentifyIntrusionpreventionsystem(IPS)VulnerabilityPersonalPasswordDecryptionSecurityinformationand eventmanagement(SIEM)PHIVerifyVirtualprivatenetwork(VPN)DMZCertificateLegalEthernetInternetserviceprovider(ISP)ServerClickProtectedEmailThreatDisable

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Malicious
  2. Mobile
  3. Suspicious
  4. PII
  5. Login
  6. Risk
  7. Firewall
  8. Phishing
  9. Intrusion detection system (IDS)
  10. Malware
  11. Bayshore
  12. Username
  13. Website
  14. Vishing
  15. Responsibility
  16. Internet
  17. Cyber
  18. 2FA (Two factor authentication)
  19. Encryption
  20. Security
  21. Authentication
  22. Router
  23. Device
  24. Wi-Fi
  25. Intranet
  26. TLS 1.2
  27. Information
  28. Data Breach
  29. Work
  30. Identify
  31. Intrusion prevention system (IPS)
  32. Vulnerability
  33. Personal
  34. Password
  35. Decryption
  36. Security information and event management (SIEM)
  37. PHI
  38. Verify
  39. Virtual private network (VPN)
  40. DMZ
  41. Certificate
  42. Legal
  43. Ethernet
  44. Internet service provider (ISP)
  45. Server
  46. Click
  47. Protected
  48. Email
  49. Threat
  50. Disable