SecurityAwarenessDataRecoveryDataProtectionAccountMonitoringInventorySoftwareMalwareDefenseSecureNetworkInventoryHardwareSecureAdminVulner-abilityMGMTIncidentResponseBoundaryDefenseSecureConfigBusinessContinuityTheAlamoLimitPortsProtocolsSecurityAwarenessDataRecoveryDataProtectionAccountMonitoringInventorySoftwareMalwareDefenseSecureNetworkInventoryHardwareSecureAdminVulner-abilityMGMTIncidentResponseBoundaryDefenseSecureConfigBusinessContinuityTheAlamoLimitPortsProtocols

Practical IT Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Security Awareness
  2. Data Recovery
  3. Data Protection
  4. Account Monitoring
  5. Inventory Software
  6. Malware Defense
  7. Secure Network
  8. Inventory Hardware
  9. Secure Admin
  10. Vulner-ability MGMT
  11. Incident Response
  12. Boundary Defense
  13. Secure Config
  14. Business Continuity
  15. The Alamo
  16. Limit Ports Protocols