DeviceIdentifyPIIFirewallInternetserviceprovider(ISP)2FA (Twofactorauthentication)CertificateAuthenticationCyberUsernameVirtualprivatenetwork(VPN)OneDriveInternetMaliciousMalwareEthernetEncryptionProtectedLoginWi-FiIntranetVulnerabilityIntrusionpreventionsystem(IPS)PasswordDecryptionInformationEmailVerifyIntrusiondetectionsystem(IDS)VishingRiskServerClickSharePointSecurityPhishingRouterPHIDMZTLS1.2ThreatWebsitePersonalSuspiciousDataBreachResponsibilityDeviceIdentifyPIIFirewallInternetserviceprovider(ISP)2FA (Twofactorauthentication)CertificateAuthenticationCyberUsernameVirtualprivatenetwork(VPN)OneDriveInternetMaliciousMalwareEthernetEncryptionProtectedLoginWi-FiIntranetVulnerabilityIntrusionpreventionsystem(IPS)PasswordDecryptionInformationEmailVerifyIntrusiondetectionsystem(IDS)VishingRiskServerClickSharePointSecurityPhishingRouterPHIDMZTLS1.2ThreatWebsitePersonalSuspiciousDataBreachResponsibility

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
  1. Device
  2. Identify
  3. PII
  4. Firewall
  5. Internet service provider (ISP)
  6. 2FA (Two factor authentication)
  7. Certificate
  8. Authentication
  9. Cyber
  10. Username
  11. Virtual private network (VPN)
  12. OneDrive
  13. Internet
  14. Malicious
  15. Malware
  16. Ethernet
  17. Encryption
  18. Protected
  19. Login
  20. Wi-Fi
  21. Intranet
  22. Vulnerability
  23. Intrusion prevention system (IPS)
  24. Password
  25. Decryption
  26. Information
  27. Email
  28. Verify
  29. Intrusion detection system (IDS)
  30. Vishing
  31. Risk
  32. Server
  33. Click
  34. SharePoint
  35. Security
  36. Phishing
  37. Router
  38. PHI
  39. DMZ
  40. TLS 1.2
  41. Threat
  42. Website
  43. Personal
  44. Suspicious
  45. Data Breach
  46. Responsibility