SecurityvulnerabilityLayeringSimplicityInsiderthreatStakeholderDatahidingFaradaycageMinimizationCybersecurityAbstractionHotspotProcessDigitalobjectResourceencapsulationLeastprivilegeDatapacketHopsAddressspaceModularityIPaddressPrivilegesDomainseparationProcessisolationBarcodeSmartdevicesTracerouteSecurityvulnerabilityLayeringSimplicityInsiderthreatStakeholderDatahidingFaradaycageMinimizationCybersecurityAbstractionHotspotProcessDigitalobjectResourceencapsulationLeastprivilegeDatapacketHopsAddressspaceModularityIPaddressPrivilegesDomainseparationProcessisolationBarcodeSmartdevicesTraceroute

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Security vulnerability
  2. Layering
  3. Simplicity
  4. Insider threat
  5. Stakeholder
  6. Data hiding
  7. Faraday cage
  8. Minimization
  9. Cybersecurity
  10. Abstraction
  11. Hotspot
  12. Process
  13. Digital object
  14. Resource encapsulation
  15. Least privilege
  16. Data packet
  17. Hops
  18. Address space
  19. Modularity
  20. IP address
  21. Privileges
  22. Domain separation
  23. Process isolation
  24. Bar code
  25. Smart devices
  26. Trace route