Intrusiondetectionsystem(IDS)PhishingVerifyPHIDecryptionIntrusionpreventionsystem(IPS)DeviceThreatInternetVulnerabilityLegalIntranetSecurityinformationand eventmanagement(SIEM)WebsiteTLS1.2WorkDisableDMZPersonalVishingSharePointMaliciousDataBreachCertificateServerPIIResponsibilityOutlookProtectedIdentifyLoginCyberSecurityInformationEmailClickFirewallEncryptionVirtualprivatenetwork(VPN)UsernameSuspiciousPasswordRisk2FA (Twofactorauthentication)RouterWi-FiInternetserviceprovider(ISP)MalwareAuthenticationEthernetIntrusiondetectionsystem(IDS)PhishingVerifyPHIDecryptionIntrusionpreventionsystem(IPS)DeviceThreatInternetVulnerabilityLegalIntranetSecurityinformationand eventmanagement(SIEM)WebsiteTLS1.2WorkDisableDMZPersonalVishingSharePointMaliciousDataBreachCertificateServerPIIResponsibilityOutlookProtectedIdentifyLoginCyberSecurityInformationEmailClickFirewallEncryptionVirtualprivatenetwork(VPN)UsernameSuspiciousPasswordRisk2FA (Twofactorauthentication)RouterWi-FiInternetserviceprovider(ISP)MalwareAuthenticationEthernet

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Intrusion detection system (IDS)
  2. Phishing
  3. Verify
  4. PHI
  5. Decryption
  6. Intrusion prevention system (IPS)
  7. Device
  8. Threat
  9. Internet
  10. Vulnerability
  11. Legal
  12. Intranet
  13. Security information and event management (SIEM)
  14. Website
  15. TLS 1.2
  16. Work
  17. Disable
  18. DMZ
  19. Personal
  20. Vishing
  21. SharePoint
  22. Malicious
  23. Data Breach
  24. Certificate
  25. Server
  26. PII
  27. Responsibility
  28. Outlook
  29. Protected
  30. Identify
  31. Login
  32. Cyber
  33. Security
  34. Information
  35. Email
  36. Click
  37. Firewall
  38. Encryption
  39. Virtual private network (VPN)
  40. Username
  41. Suspicious
  42. Password
  43. Risk
  44. 2FA (Two factor authentication)
  45. Router
  46. Wi-Fi
  47. Internet service provider (ISP)
  48. Malware
  49. Authentication
  50. Ethernet