IdentifyProtectedTLS1.2Intrusionpreventionsystem(IPS)ThreatSecurityIntranetInternetRiskEncryptionSuspiciousVulnerabilityMaliciousInformationSharePointMalwarePersonalDeviceInternetserviceprovider(ISP)OneDriveDataBreachCertificateServerPhishingVirtualprivatenetwork(VPN)DecryptionWi-FiAuthenticationCyberFirewallVishingEmailDMZRouter2FA (Twofactorauthentication)PHIUsernamePIIIntrusiondetectionsystem(IDS)ClickVerifyResponsibilityLoginEthernetWebsitePasswordIdentifyProtectedTLS1.2Intrusionpreventionsystem(IPS)ThreatSecurityIntranetInternetRiskEncryptionSuspiciousVulnerabilityMaliciousInformationSharePointMalwarePersonalDeviceInternetserviceprovider(ISP)OneDriveDataBreachCertificateServerPhishingVirtualprivatenetwork(VPN)DecryptionWi-FiAuthenticationCyberFirewallVishingEmailDMZRouter2FA (Twofactorauthentication)PHIUsernamePIIIntrusiondetectionsystem(IDS)ClickVerifyResponsibilityLoginEthernetWebsitePassword

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
  1. Identify
  2. Protected
  3. TLS 1.2
  4. Intrusion prevention system (IPS)
  5. Threat
  6. Security
  7. Intranet
  8. Internet
  9. Risk
  10. Encryption
  11. Suspicious
  12. Vulnerability
  13. Malicious
  14. Information
  15. SharePoint
  16. Malware
  17. Personal
  18. Device
  19. Internet service provider (ISP)
  20. OneDrive
  21. Data Breach
  22. Certificate
  23. Server
  24. Phishing
  25. Virtual private network (VPN)
  26. Decryption
  27. Wi-Fi
  28. Authentication
  29. Cyber
  30. Firewall
  31. Vishing
  32. Email
  33. DMZ
  34. Router
  35. 2FA (Two factor authentication)
  36. PHI
  37. Username
  38. PII
  39. Intrusion detection system (IDS)
  40. Click
  41. Verify
  42. Responsibility
  43. Login
  44. Ethernet
  45. Website
  46. Password