DataBreachRouterSharePointCyberFirewallInternetVishingLoginRiskPIIOneDrivePHIResponsibilityVerifyEmailMaliciousIntrusiondetectionsystem(IDS)TLS1.2PersonalPhishingInternetserviceprovider(ISP)Virtualprivatenetwork(VPN)DMZInformationEncryptionPasswordUsernameWi-FiMalwareVulnerabilityDeviceCertificateIntranetThreatIdentify2FA (Twofactorauthentication)DecryptionSecurityIntrusionpreventionsystem(IPS)ClickAuthenticationSuspiciousServerWebsiteEthernetProtectedDataBreachRouterSharePointCyberFirewallInternetVishingLoginRiskPIIOneDrivePHIResponsibilityVerifyEmailMaliciousIntrusiondetectionsystem(IDS)TLS1.2PersonalPhishingInternetserviceprovider(ISP)Virtualprivatenetwork(VPN)DMZInformationEncryptionPasswordUsernameWi-FiMalwareVulnerabilityDeviceCertificateIntranetThreatIdentify2FA (Twofactorauthentication)DecryptionSecurityIntrusionpreventionsystem(IPS)ClickAuthenticationSuspiciousServerWebsiteEthernetProtected

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
  1. Data Breach
  2. Router
  3. SharePoint
  4. Cyber
  5. Firewall
  6. Internet
  7. Vishing
  8. Login
  9. Risk
  10. PII
  11. OneDrive
  12. PHI
  13. Responsibility
  14. Verify
  15. Email
  16. Malicious
  17. Intrusion detection system (IDS)
  18. TLS 1.2
  19. Personal
  20. Phishing
  21. Internet service provider (ISP)
  22. Virtual private network (VPN)
  23. DMZ
  24. Information
  25. Encryption
  26. Password
  27. Username
  28. Wi-Fi
  29. Malware
  30. Vulnerability
  31. Device
  32. Certificate
  33. Intranet
  34. Threat
  35. Identify
  36. 2FA (Two factor authentication)
  37. Decryption
  38. Security
  39. Intrusion prevention system (IPS)
  40. Click
  41. Authentication
  42. Suspicious
  43. Server
  44. Website
  45. Ethernet
  46. Protected