Virtualprivatenetwork(VPN)PersonalTLS1.2AuthenticationSuspiciousIdentifyPHIResponsibilityIntranetCertificateWi-FiMalwareMaliciousOutlookLoginUsernameFirewallDMZWorkDecryptionThreatDeviceLegal2FA (Twofactorauthentication)PasswordClickEncryptionSharePointVishingProtectedCyberIntrusionpreventionsystem(IPS)EmailRouterEthernetDataBreachVulnerabilityWebsiteVerifyDisableInternetserviceprovider(ISP)PhishingInternetIntrusiondetectionsystem(IDS)RiskServerSecurityInformationPIISecurityinformationand eventmanagement(SIEM)Virtualprivatenetwork(VPN)PersonalTLS1.2AuthenticationSuspiciousIdentifyPHIResponsibilityIntranetCertificateWi-FiMalwareMaliciousOutlookLoginUsernameFirewallDMZWorkDecryptionThreatDeviceLegal2FA (Twofactorauthentication)PasswordClickEncryptionSharePointVishingProtectedCyberIntrusionpreventionsystem(IPS)EmailRouterEthernetDataBreachVulnerabilityWebsiteVerifyDisableInternetserviceprovider(ISP)PhishingInternetIntrusiondetectionsystem(IDS)RiskServerSecurityInformationPIISecurityinformationand eventmanagement(SIEM)

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Virtual private network (VPN)
  2. Personal
  3. TLS 1.2
  4. Authentication
  5. Suspicious
  6. Identify
  7. PHI
  8. Responsibility
  9. Intranet
  10. Certificate
  11. Wi-Fi
  12. Malware
  13. Malicious
  14. Outlook
  15. Login
  16. Username
  17. Firewall
  18. DMZ
  19. Work
  20. Decryption
  21. Threat
  22. Device
  23. Legal
  24. 2FA (Two factor authentication)
  25. Password
  26. Click
  27. Encryption
  28. SharePoint
  29. Vishing
  30. Protected
  31. Cyber
  32. Intrusion prevention system (IPS)
  33. Email
  34. Router
  35. Ethernet
  36. Data Breach
  37. Vulnerability
  38. Website
  39. Verify
  40. Disable
  41. Internet service provider (ISP)
  42. Phishing
  43. Internet
  44. Intrusion detection system (IDS)
  45. Risk
  46. Server
  47. Security
  48. Information
  49. PII
  50. Security information and event management (SIEM)