DecryptionInternetserviceprovider(ISP)ProtectedRiskClickVerifyPasswordSecurityCertificateLoginEmailDeviceEncryptionPhishingLegalDataBreachUsernameWorkPersonalDMZThreatWi-FiSuspiciousWebsiteIntrusionpreventionsystem(IPS)MaliciousDisableCyberTLS1.2InformationRouterIntrusiondetectionsystem(IDS)Securityinformationand eventmanagement(SIEM)VishingOutlookIntranetIdentifyResponsibilityServerVulnerability2FA (Twofactorauthentication)Virtualprivatenetwork(VPN)AuthenticationEthernetPHIPIIInternetSharePointFirewallMalwareDecryptionInternetserviceprovider(ISP)ProtectedRiskClickVerifyPasswordSecurityCertificateLoginEmailDeviceEncryptionPhishingLegalDataBreachUsernameWorkPersonalDMZThreatWi-FiSuspiciousWebsiteIntrusionpreventionsystem(IPS)MaliciousDisableCyberTLS1.2InformationRouterIntrusiondetectionsystem(IDS)Securityinformationand eventmanagement(SIEM)VishingOutlookIntranetIdentifyResponsibilityServerVulnerability2FA (Twofactorauthentication)Virtualprivatenetwork(VPN)AuthenticationEthernetPHIPIIInternetSharePointFirewallMalware

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Decryption
  2. Internet service provider (ISP)
  3. Protected
  4. Risk
  5. Click
  6. Verify
  7. Password
  8. Security
  9. Certificate
  10. Login
  11. Email
  12. Device
  13. Encryption
  14. Phishing
  15. Legal
  16. Data Breach
  17. Username
  18. Work
  19. Personal
  20. DMZ
  21. Threat
  22. Wi-Fi
  23. Suspicious
  24. Website
  25. Intrusion prevention system (IPS)
  26. Malicious
  27. Disable
  28. Cyber
  29. TLS 1.2
  30. Information
  31. Router
  32. Intrusion detection system (IDS)
  33. Security information and event management (SIEM)
  34. Vishing
  35. Outlook
  36. Intranet
  37. Identify
  38. Responsibility
  39. Server
  40. Vulnerability
  41. 2FA (Two factor authentication)
  42. Virtual private network (VPN)
  43. Authentication
  44. Ethernet
  45. PHI
  46. PII
  47. Internet
  48. SharePoint
  49. Firewall
  50. Malware