ResourceencapsulationHotspotCybersecurityLayeringPrivilegesBarcodeInsiderthreatMinimizationHopsDigitalobjectTracerouteLeastprivilegeDatapacketSmartdevicesDatahidingModularitySimplicityIPaddressFaradaycageProcessProcessisolationStakeholderDomainseparationSecurityvulnerabilityAbstractionAddressspaceResourceencapsulationHotspotCybersecurityLayeringPrivilegesBarcodeInsiderthreatMinimizationHopsDigitalobjectTracerouteLeastprivilegeDatapacketSmartdevicesDatahidingModularitySimplicityIPaddressFaradaycageProcessProcessisolationStakeholderDomainseparationSecurityvulnerabilityAbstractionAddressspace

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Resource encapsulation
  2. Hotspot
  3. Cybersecurity
  4. Layering
  5. Privileges
  6. Bar code
  7. Insider threat
  8. Minimization
  9. Hops
  10. Digital object
  11. Trace route
  12. Least privilege
  13. Data packet
  14. Smart devices
  15. Data hiding
  16. Modularity
  17. Simplicity
  18. IP address
  19. Faraday cage
  20. Process
  21. Process isolation
  22. Stakeholder
  23. Domain separation
  24. Security vulnerability
  25. Abstraction
  26. Address space