IntranetVishingDataBreachSecurityinformationand eventmanagement(SIEM)RouterVerifyCertificateSuspiciousWorkPhishingProtectedTLS1.2Information2FA (Twofactorauthentication)DecryptionResponsibilityEncryptionAuthenticationIntrusiondetectionsystem(IDS)MalwareEthernetClickWi-FiMaliciousVirtualprivatenetwork(VPN)LoginSecurityRiskWebsitePIIVulnerabilityDeviceFirewallUsernamePersonalIntrusionpreventionsystem(IPS)ServerEmailIdentifyLegalDisableThreatDMZOutlookInternetInternetserviceprovider(ISP)CyberSharePointPasswordPHIIntranetVishingDataBreachSecurityinformationand eventmanagement(SIEM)RouterVerifyCertificateSuspiciousWorkPhishingProtectedTLS1.2Information2FA (Twofactorauthentication)DecryptionResponsibilityEncryptionAuthenticationIntrusiondetectionsystem(IDS)MalwareEthernetClickWi-FiMaliciousVirtualprivatenetwork(VPN)LoginSecurityRiskWebsitePIIVulnerabilityDeviceFirewallUsernamePersonalIntrusionpreventionsystem(IPS)ServerEmailIdentifyLegalDisableThreatDMZOutlookInternetInternetserviceprovider(ISP)CyberSharePointPasswordPHI

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
  1. Intranet
  2. Vishing
  3. Data Breach
  4. Security information and event management (SIEM)
  5. Router
  6. Verify
  7. Certificate
  8. Suspicious
  9. Work
  10. Phishing
  11. Protected
  12. TLS 1.2
  13. Information
  14. 2FA (Two factor authentication)
  15. Decryption
  16. Responsibility
  17. Encryption
  18. Authentication
  19. Intrusion detection system (IDS)
  20. Malware
  21. Ethernet
  22. Click
  23. Wi-Fi
  24. Malicious
  25. Virtual private network (VPN)
  26. Login
  27. Security
  28. Risk
  29. Website
  30. PII
  31. Vulnerability
  32. Device
  33. Firewall
  34. Username
  35. Personal
  36. Intrusion prevention system (IPS)
  37. Server
  38. Email
  39. Identify
  40. Legal
  41. Disable
  42. Threat
  43. DMZ
  44. Outlook
  45. Internet
  46. Internet service provider (ISP)
  47. Cyber
  48. SharePoint
  49. Password
  50. PHI