LeastprivilegeResourceencapsulationInsiderthreatSimplicityPrivilegesAbstractionHopsMinimizationDatapacketProcessisolationSmartdevicesHotspotModularityDigitalobjectCybersecurityIPaddressTracerouteBarcodeProcessLayeringDomainseparationAddressspaceStakeholderSecurityvulnerabilityFaradaycageDatahidingLeastprivilegeResourceencapsulationInsiderthreatSimplicityPrivilegesAbstractionHopsMinimizationDatapacketProcessisolationSmartdevicesHotspotModularityDigitalobjectCybersecurityIPaddressTracerouteBarcodeProcessLayeringDomainseparationAddressspaceStakeholderSecurityvulnerabilityFaradaycageDatahiding

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Least privilege
  2. Resource encapsulation
  3. Insider threat
  4. Simplicity
  5. Privileges
  6. Abstraction
  7. Hops
  8. Minimization
  9. Data packet
  10. Process isolation
  11. Smart devices
  12. Hotspot
  13. Modularity
  14. Digital object
  15. Cybersecurity
  16. IP address
  17. Trace route
  18. Bar code
  19. Process
  20. Layering
  21. Domain separation
  22. Address space
  23. Stakeholder
  24. Security vulnerability
  25. Faraday cage
  26. Data hiding