SharePointEmailSecurityinformationand eventmanagement(SIEM)UsernameDeviceOutlookIntrusionpreventionsystem(IPS)LegalSuspiciousIntrusiondetectionsystem(IDS)ClickPasswordVulnerabilityPIIResponsibilityRouterAuthenticationEthernet2FA (Twofactorauthentication)IntranetIdentifyVerifyProtectedServerLoginInternetPersonalInternetserviceprovider(ISP)WorkDisableDecryptionCertificateRiskWebsiteMaliciousDataBreachEncryptionPhishingCyberVirtualprivatenetwork(VPN)InformationVishingSecurityDMZWi-FiFirewallMalwareTLS1.2PHIThreatSharePointEmailSecurityinformationand eventmanagement(SIEM)UsernameDeviceOutlookIntrusionpreventionsystem(IPS)LegalSuspiciousIntrusiondetectionsystem(IDS)ClickPasswordVulnerabilityPIIResponsibilityRouterAuthenticationEthernet2FA (Twofactorauthentication)IntranetIdentifyVerifyProtectedServerLoginInternetPersonalInternetserviceprovider(ISP)WorkDisableDecryptionCertificateRiskWebsiteMaliciousDataBreachEncryptionPhishingCyberVirtualprivatenetwork(VPN)InformationVishingSecurityDMZWi-FiFirewallMalwareTLS1.2PHIThreat

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. SharePoint
  2. Email
  3. Security information and event management (SIEM)
  4. Username
  5. Device
  6. Outlook
  7. Intrusion prevention system (IPS)
  8. Legal
  9. Suspicious
  10. Intrusion detection system (IDS)
  11. Click
  12. Password
  13. Vulnerability
  14. PII
  15. Responsibility
  16. Router
  17. Authentication
  18. Ethernet
  19. 2FA (Two factor authentication)
  20. Intranet
  21. Identify
  22. Verify
  23. Protected
  24. Server
  25. Login
  26. Internet
  27. Personal
  28. Internet service provider (ISP)
  29. Work
  30. Disable
  31. Decryption
  32. Certificate
  33. Risk
  34. Website
  35. Malicious
  36. Data Breach
  37. Encryption
  38. Phishing
  39. Cyber
  40. Virtual private network (VPN)
  41. Information
  42. Vishing
  43. Security
  44. DMZ
  45. Wi-Fi
  46. Firewall
  47. Malware
  48. TLS 1.2
  49. PHI
  50. Threat