EncryptionDisableSecurityDataBreachEthernetServerDecryptionAuthenticationResponsibilityFirewallIntrusiondetectionsystem(IDS)IntranetRiskVishingIdentifyVirtualprivatenetwork(VPN)ThreatDeviceVerifySecurityinformationand eventmanagement(SIEM)TLS1.2RouterMalwarePHIWorkPasswordCertificateSharePointPhishingProtectedLoginInformationPersonalDMZInternet2FA (Twofactorauthentication)Intrusionpreventionsystem(IPS)WebsiteClickInternetserviceprovider(ISP)SuspiciousPIIVulnerabilityLegalWi-FiCyberMaliciousEmailOutlookUsernameEncryptionDisableSecurityDataBreachEthernetServerDecryptionAuthenticationResponsibilityFirewallIntrusiondetectionsystem(IDS)IntranetRiskVishingIdentifyVirtualprivatenetwork(VPN)ThreatDeviceVerifySecurityinformationand eventmanagement(SIEM)TLS1.2RouterMalwarePHIWorkPasswordCertificateSharePointPhishingProtectedLoginInformationPersonalDMZInternet2FA (Twofactorauthentication)Intrusionpreventionsystem(IPS)WebsiteClickInternetserviceprovider(ISP)SuspiciousPIIVulnerabilityLegalWi-FiCyberMaliciousEmailOutlookUsername

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Encryption
  2. Disable
  3. Security
  4. Data Breach
  5. Ethernet
  6. Server
  7. Decryption
  8. Authentication
  9. Responsibility
  10. Firewall
  11. Intrusion detection system (IDS)
  12. Intranet
  13. Risk
  14. Vishing
  15. Identify
  16. Virtual private network (VPN)
  17. Threat
  18. Device
  19. Verify
  20. Security information and event management (SIEM)
  21. TLS 1.2
  22. Router
  23. Malware
  24. PHI
  25. Work
  26. Password
  27. Certificate
  28. SharePoint
  29. Phishing
  30. Protected
  31. Login
  32. Information
  33. Personal
  34. DMZ
  35. Internet
  36. 2FA (Two factor authentication)
  37. Intrusion prevention system (IPS)
  38. Website
  39. Click
  40. Internet service provider (ISP)
  41. Suspicious
  42. PII
  43. Vulnerability
  44. Legal
  45. Wi-Fi
  46. Cyber
  47. Malicious
  48. Email
  49. Outlook
  50. Username