ClickVerifyMaliciousProtectedSecurityinformationand eventmanagement(SIEM)VulnerabilityDeviceUsernamePersonalRouterPhishingDecryptionVishingPIIResponsibilityWi-FiRiskIntrusionpreventionsystem(IPS)ServerFirewallSecurityDMZIntranetThreatWebsiteTLS1.2EncryptionLegalCyberInternetserviceprovider(ISP)InternetEthernetLoginInformationAuthenticationWorkPasswordCertificateVirtualprivatenetwork(VPN)PHIDataBreachSuspiciousIdentifySharePointOutlookDisableMalwareEmail2FA (Twofactorauthentication)Intrusiondetectionsystem(IDS)ClickVerifyMaliciousProtectedSecurityinformationand eventmanagement(SIEM)VulnerabilityDeviceUsernamePersonalRouterPhishingDecryptionVishingPIIResponsibilityWi-FiRiskIntrusionpreventionsystem(IPS)ServerFirewallSecurityDMZIntranetThreatWebsiteTLS1.2EncryptionLegalCyberInternetserviceprovider(ISP)InternetEthernetLoginInformationAuthenticationWorkPasswordCertificateVirtualprivatenetwork(VPN)PHIDataBreachSuspiciousIdentifySharePointOutlookDisableMalwareEmail2FA (Twofactorauthentication)Intrusiondetectionsystem(IDS)

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Click
  2. Verify
  3. Malicious
  4. Protected
  5. Security information and event management (SIEM)
  6. Vulnerability
  7. Device
  8. Username
  9. Personal
  10. Router
  11. Phishing
  12. Decryption
  13. Vishing
  14. PII
  15. Responsibility
  16. Wi-Fi
  17. Risk
  18. Intrusion prevention system (IPS)
  19. Server
  20. Firewall
  21. Security
  22. DMZ
  23. Intranet
  24. Threat
  25. Website
  26. TLS 1.2
  27. Encryption
  28. Legal
  29. Cyber
  30. Internet service provider (ISP)
  31. Internet
  32. Ethernet
  33. Login
  34. Information
  35. Authentication
  36. Work
  37. Password
  38. Certificate
  39. Virtual private network (VPN)
  40. PHI
  41. Data Breach
  42. Suspicious
  43. Identify
  44. SharePoint
  45. Outlook
  46. Disable
  47. Malware
  48. Email
  49. 2FA (Two factor authentication)
  50. Intrusion detection system (IDS)