RiskServerTLS1.2EmailIdentifyWi-FiSecurityPhishingPIIProtectedDeviceClickVerifyVishingSharePoint2FA (Twofactorauthentication)FirewallCyberVirtualprivatenetwork(VPN)Internetserviceprovider(ISP)WebsiteDecryptionIntrusionpreventionsystem(IPS)VulnerabilityEthernetMaliciousPersonalDataBreachPasswordLoginCertificateIntranetAuthenticationInternetThreatInformationMalwareSuspiciousPHIOneDriveIntrusiondetectionsystem(IDS)EncryptionDMZRouterResponsibilityUsernameRiskServerTLS1.2EmailIdentifyWi-FiSecurityPhishingPIIProtectedDeviceClickVerifyVishingSharePoint2FA (Twofactorauthentication)FirewallCyberVirtualprivatenetwork(VPN)Internetserviceprovider(ISP)WebsiteDecryptionIntrusionpreventionsystem(IPS)VulnerabilityEthernetMaliciousPersonalDataBreachPasswordLoginCertificateIntranetAuthenticationInternetThreatInformationMalwareSuspiciousPHIOneDriveIntrusiondetectionsystem(IDS)EncryptionDMZRouterResponsibilityUsername

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
  1. Risk
  2. Server
  3. TLS 1.2
  4. Email
  5. Identify
  6. Wi-Fi
  7. Security
  8. Phishing
  9. PII
  10. Protected
  11. Device
  12. Click
  13. Verify
  14. Vishing
  15. SharePoint
  16. 2FA (Two factor authentication)
  17. Firewall
  18. Cyber
  19. Virtual private network (VPN)
  20. Internet service provider (ISP)
  21. Website
  22. Decryption
  23. Intrusion prevention system (IPS)
  24. Vulnerability
  25. Ethernet
  26. Malicious
  27. Personal
  28. Data Breach
  29. Password
  30. Login
  31. Certificate
  32. Intranet
  33. Authentication
  34. Internet
  35. Threat
  36. Information
  37. Malware
  38. Suspicious
  39. PHI
  40. OneDrive
  41. Intrusion detection system (IDS)
  42. Encryption
  43. DMZ
  44. Router
  45. Responsibility
  46. Username