SimplicityDatahidingHopsTracerouteDigitalobjectFaradaycageIPaddressHotspotPrivilegesProcessDomainseparationMinimizationProcessisolationAbstractionSmartdevicesAddressspaceDatapacketSecurityvulnerabilityResourceencapsulationModularityCybersecurityInsiderthreatStakeholderBarcodeLeastprivilegeLayeringSimplicityDatahidingHopsTracerouteDigitalobjectFaradaycageIPaddressHotspotPrivilegesProcessDomainseparationMinimizationProcessisolationAbstractionSmartdevicesAddressspaceDatapacketSecurityvulnerabilityResourceencapsulationModularityCybersecurityInsiderthreatStakeholderBarcodeLeastprivilegeLayering

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Simplicity
  2. Data hiding
  3. Hops
  4. Trace route
  5. Digital object
  6. Faraday cage
  7. IP address
  8. Hotspot
  9. Privileges
  10. Process
  11. Domain separation
  12. Minimization
  13. Process isolation
  14. Abstraction
  15. Smart devices
  16. Address space
  17. Data packet
  18. Security vulnerability
  19. Resource encapsulation
  20. Modularity
  21. Cybersecurity
  22. Insider threat
  23. Stakeholder
  24. Bar code
  25. Least privilege
  26. Layering