SecureConfigSecureNetworkBusinessContinuityMalwareDefenseInventorySoftwareSecurityAwarenessInventoryHardwareDataRecoverySecureAdminIncidentResponseLimitPortsProtocolsDataProtectionAccountMonitoringTheAlamoVulner-abilityMGMTBoundaryDefenseSecureConfigSecureNetworkBusinessContinuityMalwareDefenseInventorySoftwareSecurityAwarenessInventoryHardwareDataRecoverySecureAdminIncidentResponseLimitPortsProtocolsDataProtectionAccountMonitoringTheAlamoVulner-abilityMGMTBoundaryDefense

Practical IT Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Secure Config
  2. Secure Network
  3. Business Continuity
  4. Malware Defense
  5. Inventory Software
  6. Security Awareness
  7. Inventory Hardware
  8. Data Recovery
  9. Secure Admin
  10. Incident Response
  11. Limit Ports Protocols
  12. Data Protection
  13. Account Monitoring
  14. The Alamo
  15. Vulner-ability MGMT
  16. Boundary Defense