Security Ethernet Vulnerability Identify Device Verify Website Outlook Phishing Certificate Security information and event management (SIEM) Login Risk Information Vishing Personal Internet service provider (ISP) Disable Intranet Malicious Threat Firewall 2FA (Two factor authentication) Legal TLS 1.2 Email Responsibility PII Authentication DMZ PHI Virtual private network (VPN) Password SharePoint Encryption Protected Internet Data Breach Malware Wi- Fi Username Suspicious Intrusion detection system (IDS) Intrusion prevention system (IPS) Work Server Click Cyber Router Decryption Security Ethernet Vulnerability Identify Device Verify Website Outlook Phishing Certificate Security information and event management (SIEM) Login Risk Information Vishing Personal Internet service provider (ISP) Disable Intranet Malicious Threat Firewall 2FA (Two factor authentication) Legal TLS 1.2 Email Responsibility PII Authentication DMZ PHI Virtual private network (VPN) Password SharePoint Encryption Protected Internet Data Breach Malware Wi- Fi Username Suspicious Intrusion detection system (IDS) Intrusion prevention system (IPS) Work Server Click Cyber Router Decryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security
Ethernet
Vulnerability
Identify
Device
Verify
Website
Outlook
Phishing
Certificate
Security information and event management (SIEM)
Login
Risk
Information
Vishing
Personal
Internet service provider (ISP)
Disable
Intranet
Malicious
Threat
Firewall
2FA (Two factor authentication)
Legal
TLS 1.2
Email
Responsibility
PII
Authentication
DMZ
PHI
Virtual private network (VPN)
Password
SharePoint
Encryption
Protected
Internet
Data Breach
Malware
Wi-Fi
Username
Suspicious
Intrusion detection system (IDS)
Intrusion prevention system (IPS)
Work
Server
Click
Cyber
Router
Decryption