PhishingCertificateDisableAuthenticationRiskResponsibilityDataBreachTLS1.2LegalServerLoginEthernetWi-FiCyberThreatWork2FA (Twofactorauthentication)PasswordVirtualprivatenetwork(VPN)InternetIntrusionpreventionsystem(IPS)IntranetVishingDMZVerifyMaliciousMalwareInformationDecryptionFirewallIdentifyRouterPHIDeviceSecurityinformationand eventmanagement(SIEM)SecurityClickIntrusiondetectionsystem(IDS)WebsiteInternetserviceprovider(ISP)SharePointPIIUsernameOutlookSuspiciousPersonalEncryptionEmailProtectedVulnerabilityPhishingCertificateDisableAuthenticationRiskResponsibilityDataBreachTLS1.2LegalServerLoginEthernetWi-FiCyberThreatWork2FA (Twofactorauthentication)PasswordVirtualprivatenetwork(VPN)InternetIntrusionpreventionsystem(IPS)IntranetVishingDMZVerifyMaliciousMalwareInformationDecryptionFirewallIdentifyRouterPHIDeviceSecurityinformationand eventmanagement(SIEM)SecurityClickIntrusiondetectionsystem(IDS)WebsiteInternetserviceprovider(ISP)SharePointPIIUsernameOutlookSuspiciousPersonalEncryptionEmailProtectedVulnerability

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Phishing
  2. Certificate
  3. Disable
  4. Authentication
  5. Risk
  6. Responsibility
  7. Data Breach
  8. TLS 1.2
  9. Legal
  10. Server
  11. Login
  12. Ethernet
  13. Wi-Fi
  14. Cyber
  15. Threat
  16. Work
  17. 2FA (Two factor authentication)
  18. Password
  19. Virtual private network (VPN)
  20. Internet
  21. Intrusion prevention system (IPS)
  22. Intranet
  23. Vishing
  24. DMZ
  25. Verify
  26. Malicious
  27. Malware
  28. Information
  29. Decryption
  30. Firewall
  31. Identify
  32. Router
  33. PHI
  34. Device
  35. Security information and event management (SIEM)
  36. Security
  37. Click
  38. Intrusion detection system (IDS)
  39. Website
  40. Internet service provider (ISP)
  41. SharePoint
  42. PII
  43. Username
  44. Outlook
  45. Suspicious
  46. Personal
  47. Encryption
  48. Email
  49. Protected
  50. Vulnerability