ModularityHotspotAbstractionLayeringBarcodeAddressspaceResourceencapsulationIPaddressProcessisolationProcessPrivilegesHopsMinimizationFaradaycageCybersecurityDomainseparationSimplicityDatahidingSecurityvulnerabilityDigitalobjectLeastprivilegeDatapacketInsiderthreatStakeholderSmartdevicesTracerouteModularityHotspotAbstractionLayeringBarcodeAddressspaceResourceencapsulationIPaddressProcessisolationProcessPrivilegesHopsMinimizationFaradaycageCybersecurityDomainseparationSimplicityDatahidingSecurityvulnerabilityDigitalobjectLeastprivilegeDatapacketInsiderthreatStakeholderSmartdevicesTraceroute

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Modularity
  2. Hotspot
  3. Abstraction
  4. Layering
  5. Bar code
  6. Address space
  7. Resource encapsulation
  8. IP address
  9. Process isolation
  10. Process
  11. Privileges
  12. Hops
  13. Minimization
  14. Faraday cage
  15. Cybersecurity
  16. Domain separation
  17. Simplicity
  18. Data hiding
  19. Security vulnerability
  20. Digital object
  21. Least privilege
  22. Data packet
  23. Insider threat
  24. Stakeholder
  25. Smart devices
  26. Trace route