Phishing Certificate Disable Authentication Risk Responsibility Data Breach TLS 1.2 Legal Server Login Ethernet Wi- Fi Cyber Threat Work 2FA (Two factor authentication) Password Virtual private network (VPN) Internet Intrusion prevention system (IPS) Intranet Vishing DMZ Verify Malicious Malware Information Decryption Firewall Identify Router PHI Device Security information and event management (SIEM) Security Click Intrusion detection system (IDS) Website Internet service provider (ISP) SharePoint PII Username Outlook Suspicious Personal Encryption Email Protected Vulnerability Phishing Certificate Disable Authentication Risk Responsibility Data Breach TLS 1.2 Legal Server Login Ethernet Wi- Fi Cyber Threat Work 2FA (Two factor authentication) Password Virtual private network (VPN) Internet Intrusion prevention system (IPS) Intranet Vishing DMZ Verify Malicious Malware Information Decryption Firewall Identify Router PHI Device Security information and event management (SIEM) Security Click Intrusion detection system (IDS) Website Internet service provider (ISP) SharePoint PII Username Outlook Suspicious Personal Encryption Email Protected Vulnerability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Certificate
Disable
Authentication
Risk
Responsibility
Data Breach
TLS 1.2
Legal
Server
Login
Ethernet
Wi-Fi
Cyber
Threat
Work
2FA (Two factor authentication)
Password
Virtual private network (VPN)
Internet
Intrusion prevention system (IPS)
Intranet
Vishing
DMZ
Verify
Malicious
Malware
Information
Decryption
Firewall
Identify
Router
PHI
Device
Security information and event management (SIEM)
Security
Click
Intrusion detection system (IDS)
Website
Internet service provider (ISP)
SharePoint
PII
Username
Outlook
Suspicious
Personal
Encryption
Email
Protected
Vulnerability