Device Identify PII Firewall Internet service provider (ISP) 2FA (Two factor authentication) Certificate Authentication Cyber Username Virtual private network (VPN) OneDrive Internet Malicious Malware Ethernet Encryption Protected Login Wi- Fi Intranet Vulnerability Intrusion prevention system (IPS) Password Decryption Information Email Verify Intrusion detection system (IDS) Vishing Risk Server Click SharePoint Security Phishing Router PHI DMZ TLS 1.2 Threat Website Personal Suspicious Data Breach Responsibility Device Identify PII Firewall Internet service provider (ISP) 2FA (Two factor authentication) Certificate Authentication Cyber Username Virtual private network (VPN) OneDrive Internet Malicious Malware Ethernet Encryption Protected Login Wi- Fi Intranet Vulnerability Intrusion prevention system (IPS) Password Decryption Information Email Verify Intrusion detection system (IDS) Vishing Risk Server Click SharePoint Security Phishing Router PHI DMZ TLS 1.2 Threat Website Personal Suspicious Data Breach Responsibility
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Device
Identify
PII
Firewall
Internet service provider (ISP)
2FA (Two factor authentication)
Certificate
Authentication
Cyber
Username
Virtual private network (VPN)
OneDrive
Internet
Malicious
Malware
Ethernet
Encryption
Protected
Login
Wi-Fi
Intranet
Vulnerability
Intrusion prevention system (IPS)
Password
Decryption
Information
Email
Verify
Intrusion detection system (IDS)
Vishing
Risk
Server
Click
SharePoint
Security
Phishing
Router
PHI
DMZ
TLS 1.2
Threat
Website
Personal
Suspicious
Data Breach
Responsibility