Intrusion detection system (IDS) Phishing Verify PHI Decryption Intrusion prevention system (IPS) Device Threat Internet Vulnerability Legal Intranet Security information and event management (SIEM) Website TLS 1.2 Work Disable DMZ Personal Vishing SharePoint Malicious Data Breach Certificate Server PII Responsibility Outlook Protected Identify Login Cyber Security Information Email Click Firewall Encryption Virtual private network (VPN) Username Suspicious Password Risk 2FA (Two factor authentication) Router Wi- Fi Internet service provider (ISP) Malware Authentication Ethernet Intrusion detection system (IDS) Phishing Verify PHI Decryption Intrusion prevention system (IPS) Device Threat Internet Vulnerability Legal Intranet Security information and event management (SIEM) Website TLS 1.2 Work Disable DMZ Personal Vishing SharePoint Malicious Data Breach Certificate Server PII Responsibility Outlook Protected Identify Login Cyber Security Information Email Click Firewall Encryption Virtual private network (VPN) Username Suspicious Password Risk 2FA (Two factor authentication) Router Wi- Fi Internet service provider (ISP) Malware Authentication Ethernet
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Intrusion detection system (IDS)
Phishing
Verify
PHI
Decryption
Intrusion prevention system (IPS)
Device
Threat
Internet
Vulnerability
Legal
Intranet
Security information and event management (SIEM)
Website
TLS 1.2
Work
Disable
DMZ
Personal
Vishing
SharePoint
Malicious
Data Breach
Certificate
Server
PII
Responsibility
Outlook
Protected
Identify
Login
Cyber
Security
Information
Email
Click
Firewall
Encryption
Virtual private network (VPN)
Username
Suspicious
Password
Risk
2FA (Two factor authentication)
Router
Wi-Fi
Internet service provider (ISP)
Malware
Authentication
Ethernet