ProtectedInternetIntrusiondetectionsystem(IDS)ServerLoginSharePointMicrosoft365PIIPersonalAuthenticationDecryptionPasswordDataBreachEthernetOneDriveThreatWebsiteClickPhishingSecuritySuspiciousMalwareCyberWi-FiMaliciousUsername2FA (Twofactorauthentication)DMZFirewallIntrusionpreventionsystem(IPS)EncryptionRiskIdentifyCloudVishingEmailInformationRouterCertificateVerifyResponsibilityVirtualprivatenetwork(VPN)VulnerabilityInternetserviceprovider(ISP)ProtectedInternetIntrusiondetectionsystem(IDS)ServerLoginSharePointMicrosoft365PIIPersonalAuthenticationDecryptionPasswordDataBreachEthernetOneDriveThreatWebsiteClickPhishingSecuritySuspiciousMalwareCyberWi-FiMaliciousUsername2FA (Twofactorauthentication)DMZFirewallIntrusionpreventionsystem(IPS)EncryptionRiskIdentifyCloudVishingEmailInformationRouterCertificateVerifyResponsibilityVirtualprivatenetwork(VPN)VulnerabilityInternetserviceprovider(ISP)

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Protected
  2. Internet
  3. Intrusion detection system (IDS)
  4. Server
  5. Login
  6. SharePoint
  7. Microsoft 365
  8. PII
  9. Personal
  10. Authentication
  11. Decryption
  12. Password
  13. Data Breach
  14. Ethernet
  15. OneDrive
  16. Threat
  17. Website
  18. Click
  19. Phishing
  20. Security
  21. Suspicious
  22. Malware
  23. Cyber
  24. Wi-Fi
  25. Malicious
  26. Username
  27. 2FA (Two factor authentication)
  28. DMZ
  29. Firewall
  30. Intrusion prevention system (IPS)
  31. Encryption
  32. Risk
  33. Identify
  34. Cloud
  35. Vishing
  36. Email
  37. Information
  38. Router
  39. Certificate
  40. Verify
  41. Responsibility
  42. Virtual private network (VPN)
  43. Vulnerability
  44. Internet service provider (ISP)