PasswordSharePointInformationFirewallIntrusionpreventionsystem(IPS)2FA (Twofactorauthentication)TLS1.2IdentifyMalwareWorkOutlookPIIEthernetResponsibilityPhishingDMZCyberDisableDataBreachWebsiteMaliciousSecurityinformationand eventmanagement(SIEM)VulnerabilityLegalPHIClickRiskIntrusiondetectionsystem(IDS)ServerLoginWi-FiVerifyThreatInternetIntranetUsernameEncryptionRouterInternetserviceprovider(ISP)ProtectedVirtualprivatenetwork(VPN)AuthenticationDeviceDecryptionEmailSuspiciousVishingPersonalCertificateSecurityPasswordSharePointInformationFirewallIntrusionpreventionsystem(IPS)2FA (Twofactorauthentication)TLS1.2IdentifyMalwareWorkOutlookPIIEthernetResponsibilityPhishingDMZCyberDisableDataBreachWebsiteMaliciousSecurityinformationand eventmanagement(SIEM)VulnerabilityLegalPHIClickRiskIntrusiondetectionsystem(IDS)ServerLoginWi-FiVerifyThreatInternetIntranetUsernameEncryptionRouterInternetserviceprovider(ISP)ProtectedVirtualprivatenetwork(VPN)AuthenticationDeviceDecryptionEmailSuspiciousVishingPersonalCertificateSecurity

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Password
  2. SharePoint
  3. Information
  4. Firewall
  5. Intrusion prevention system (IPS)
  6. 2FA (Two factor authentication)
  7. TLS 1.2
  8. Identify
  9. Malware
  10. Work
  11. Outlook
  12. PII
  13. Ethernet
  14. Responsibility
  15. Phishing
  16. DMZ
  17. Cyber
  18. Disable
  19. Data Breach
  20. Website
  21. Malicious
  22. Security information and event management (SIEM)
  23. Vulnerability
  24. Legal
  25. PHI
  26. Click
  27. Risk
  28. Intrusion detection system (IDS)
  29. Server
  30. Login
  31. Wi-Fi
  32. Verify
  33. Threat
  34. Internet
  35. Intranet
  36. Username
  37. Encryption
  38. Router
  39. Internet service provider (ISP)
  40. Protected
  41. Virtual private network (VPN)
  42. Authentication
  43. Device
  44. Decryption
  45. Email
  46. Suspicious
  47. Vishing
  48. Personal
  49. Certificate
  50. Security