DecryptionEncryptionWi-FiVishingSecurityIntrusiondetectionsystem(IDS)InformationMaliciousDataBreachSuspiciousPasswordInternetserviceprovider(ISP)FirewallCyberPhishingTLS1.2AuthenticationVulnerabilityVerifyServerProtectedIntranetInternetSharePointEmailRiskMalwareUsernamePIIWebsiteDeviceOneDriveLoginThreatDMZClick2FA (Twofactorauthentication)Virtualprivatenetwork(VPN)CertificateEthernetResponsibilityPersonalIntrusionpreventionsystem(IPS)IdentifyPHIRouterDecryptionEncryptionWi-FiVishingSecurityIntrusiondetectionsystem(IDS)InformationMaliciousDataBreachSuspiciousPasswordInternetserviceprovider(ISP)FirewallCyberPhishingTLS1.2AuthenticationVulnerabilityVerifyServerProtectedIntranetInternetSharePointEmailRiskMalwareUsernamePIIWebsiteDeviceOneDriveLoginThreatDMZClick2FA (Twofactorauthentication)Virtualprivatenetwork(VPN)CertificateEthernetResponsibilityPersonalIntrusionpreventionsystem(IPS)IdentifyPHIRouter

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
  1. Decryption
  2. Encryption
  3. Wi-Fi
  4. Vishing
  5. Security
  6. Intrusion detection system (IDS)
  7. Information
  8. Malicious
  9. Data Breach
  10. Suspicious
  11. Password
  12. Internet service provider (ISP)
  13. Firewall
  14. Cyber
  15. Phishing
  16. TLS 1.2
  17. Authentication
  18. Vulnerability
  19. Verify
  20. Server
  21. Protected
  22. Intranet
  23. Internet
  24. SharePoint
  25. Email
  26. Risk
  27. Malware
  28. Username
  29. PII
  30. Website
  31. Device
  32. OneDrive
  33. Login
  34. Threat
  35. DMZ
  36. Click
  37. 2FA (Two factor authentication)
  38. Virtual private network (VPN)
  39. Certificate
  40. Ethernet
  41. Responsibility
  42. Personal
  43. Intrusion prevention system (IPS)
  44. Identify
  45. PHI
  46. Router