PHIDecryptionClickServerInternetserviceprovider(ISP)InternetInformationLegalThreatIntrusionpreventionsystem(IPS)AuthenticationDeviceSecurityPersonalWorkSharePointPasswordMalwareVulnerabilitySecurityinformationand eventmanagement(SIEM)VishingDataBreachRiskVirtualprivatenetwork(VPN)TLS1.2WebsiteDisableLoginMaliciousEncryptionEmailIntrusiondetectionsystem(IDS)DMZCyberProtectedSuspiciousIdentifyIntranetPIIFirewallPhishingResponsibilityRouterVerifyWi-FiEthernet2FA (Twofactorauthentication)CertificateUsernameOutlookPHIDecryptionClickServerInternetserviceprovider(ISP)InternetInformationLegalThreatIntrusionpreventionsystem(IPS)AuthenticationDeviceSecurityPersonalWorkSharePointPasswordMalwareVulnerabilitySecurityinformationand eventmanagement(SIEM)VishingDataBreachRiskVirtualprivatenetwork(VPN)TLS1.2WebsiteDisableLoginMaliciousEncryptionEmailIntrusiondetectionsystem(IDS)DMZCyberProtectedSuspiciousIdentifyIntranetPIIFirewallPhishingResponsibilityRouterVerifyWi-FiEthernet2FA (Twofactorauthentication)CertificateUsernameOutlook

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. PHI
  2. Decryption
  3. Click
  4. Server
  5. Internet service provider (ISP)
  6. Internet
  7. Information
  8. Legal
  9. Threat
  10. Intrusion prevention system (IPS)
  11. Authentication
  12. Device
  13. Security
  14. Personal
  15. Work
  16. SharePoint
  17. Password
  18. Malware
  19. Vulnerability
  20. Security information and event management (SIEM)
  21. Vishing
  22. Data Breach
  23. Risk
  24. Virtual private network (VPN)
  25. TLS 1.2
  26. Website
  27. Disable
  28. Login
  29. Malicious
  30. Encryption
  31. Email
  32. Intrusion detection system (IDS)
  33. DMZ
  34. Cyber
  35. Protected
  36. Suspicious
  37. Identify
  38. Intranet
  39. PII
  40. Firewall
  41. Phishing
  42. Responsibility
  43. Router
  44. Verify
  45. Wi-Fi
  46. Ethernet
  47. 2FA (Two factor authentication)
  48. Certificate
  49. Username
  50. Outlook