DataBreachPIIServerMalwareUsernameRouterVerifyTLS1.2FirewallEncryptionPhishingResponsibilityProtectedSharePointEthernetSuspiciousVirtualprivatenetwork(VPN)ClickDecryptionOneDrivePHIInternetIntranet2FA (Twofactorauthentication)Internetserviceprovider(ISP)VishingSecurityWebsiteCyberThreatWi-FiIntrusionpreventionsystem(IPS)CertificateVulnerabilityDMZMaliciousRiskAuthenticationIdentifyIntrusiondetectionsystem(IDS)EmailPersonalPasswordDeviceInformationLoginDataBreachPIIServerMalwareUsernameRouterVerifyTLS1.2FirewallEncryptionPhishingResponsibilityProtectedSharePointEthernetSuspiciousVirtualprivatenetwork(VPN)ClickDecryptionOneDrivePHIInternetIntranet2FA (Twofactorauthentication)Internetserviceprovider(ISP)VishingSecurityWebsiteCyberThreatWi-FiIntrusionpreventionsystem(IPS)CertificateVulnerabilityDMZMaliciousRiskAuthenticationIdentifyIntrusiondetectionsystem(IDS)EmailPersonalPasswordDeviceInformationLogin

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
  1. Data Breach
  2. PII
  3. Server
  4. Malware
  5. Username
  6. Router
  7. Verify
  8. TLS 1.2
  9. Firewall
  10. Encryption
  11. Phishing
  12. Responsibility
  13. Protected
  14. SharePoint
  15. Ethernet
  16. Suspicious
  17. Virtual private network (VPN)
  18. Click
  19. Decryption
  20. OneDrive
  21. PHI
  22. Internet
  23. Intranet
  24. 2FA (Two factor authentication)
  25. Internet service provider (ISP)
  26. Vishing
  27. Security
  28. Website
  29. Cyber
  30. Threat
  31. Wi-Fi
  32. Intrusion prevention system (IPS)
  33. Certificate
  34. Vulnerability
  35. DMZ
  36. Malicious
  37. Risk
  38. Authentication
  39. Identify
  40. Intrusion detection system (IDS)
  41. Email
  42. Personal
  43. Password
  44. Device
  45. Information
  46. Login