SecurityEthernetVulnerabilityIdentifyDeviceVerifyWebsiteOutlookPhishingCertificateSecurityinformationand eventmanagement(SIEM)LoginRiskInformationVishingPersonalInternetserviceprovider(ISP)DisableIntranetMaliciousThreatFirewall2FA (Twofactorauthentication)LegalTLS1.2EmailResponsibilityPIIAuthenticationDMZPHIVirtualprivatenetwork(VPN)PasswordSharePointEncryptionProtectedInternetDataBreachMalwareWi-FiUsernameSuspiciousIntrusiondetectionsystem(IDS)Intrusionpreventionsystem(IPS)WorkServerClickCyberRouterDecryptionSecurityEthernetVulnerabilityIdentifyDeviceVerifyWebsiteOutlookPhishingCertificateSecurityinformationand eventmanagement(SIEM)LoginRiskInformationVishingPersonalInternetserviceprovider(ISP)DisableIntranetMaliciousThreatFirewall2FA (Twofactorauthentication)LegalTLS1.2EmailResponsibilityPIIAuthenticationDMZPHIVirtualprivatenetwork(VPN)PasswordSharePointEncryptionProtectedInternetDataBreachMalwareWi-FiUsernameSuspiciousIntrusiondetectionsystem(IDS)Intrusionpreventionsystem(IPS)WorkServerClickCyberRouterDecryption

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Security
  2. Ethernet
  3. Vulnerability
  4. Identify
  5. Device
  6. Verify
  7. Website
  8. Outlook
  9. Phishing
  10. Certificate
  11. Security information and event management (SIEM)
  12. Login
  13. Risk
  14. Information
  15. Vishing
  16. Personal
  17. Internet service provider (ISP)
  18. Disable
  19. Intranet
  20. Malicious
  21. Threat
  22. Firewall
  23. 2FA (Two factor authentication)
  24. Legal
  25. TLS 1.2
  26. Email
  27. Responsibility
  28. PII
  29. Authentication
  30. DMZ
  31. PHI
  32. Virtual private network (VPN)
  33. Password
  34. SharePoint
  35. Encryption
  36. Protected
  37. Internet
  38. Data Breach
  39. Malware
  40. Wi-Fi
  41. Username
  42. Suspicious
  43. Intrusion detection system (IDS)
  44. Intrusion prevention system (IPS)
  45. Work
  46. Server
  47. Click
  48. Cyber
  49. Router
  50. Decryption