SmartdevicesProcessisolationBarcodeResourceencapsulationFaradaycageHopsHotspotCybersecurityTracerouteAddressspaceLayeringProcessPrivilegesInsiderthreatAbstractionIPaddressSecurityvulnerabilitySimplicityDigitalobjectDatahidingStakeholderMinimizationDomainseparationDatapacketLeastprivilegeModularitySmartdevicesProcessisolationBarcodeResourceencapsulationFaradaycageHopsHotspotCybersecurityTracerouteAddressspaceLayeringProcessPrivilegesInsiderthreatAbstractionIPaddressSecurityvulnerabilitySimplicityDigitalobjectDatahidingStakeholderMinimizationDomainseparationDatapacketLeastprivilegeModularity

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Smart devices
  2. Process isolation
  3. Bar code
  4. Resource encapsulation
  5. Faraday cage
  6. Hops
  7. Hotspot
  8. Cybersecurity
  9. Trace route
  10. Address space
  11. Layering
  12. Process
  13. Privileges
  14. Insider threat
  15. Abstraction
  16. IP address
  17. Security vulnerability
  18. Simplicity
  19. Digital object
  20. Data hiding
  21. Stakeholder
  22. Minimization
  23. Domain separation
  24. Data packet
  25. Least privilege
  26. Modularity