Phishing Vulnerability Vishing Internet service provider (ISP) Cyber Personal Authentication 2FA (Two factor authentication) Internet Risk DMZ Threat Username Malware Firewall Malicious Router Microsoft 365 OneDrive Ethernet Encryption Suspicious Intrusion prevention system (IPS) SharePoint Data Breach Server Email Website Identify Virtual private network (VPN) Login Wi- Fi Decryption Intrusion detection system (IDS) Security Responsibility Password Certificate PII Phishing Vulnerability Vishing Internet service provider (ISP) Cyber Personal Authentication 2FA (Two factor authentication) Internet Risk DMZ Threat Username Malware Firewall Malicious Router Microsoft 365 OneDrive Ethernet Encryption Suspicious Intrusion prevention system (IPS) SharePoint Data Breach Server Email Website Identify Virtual private network (VPN) Login Wi- Fi Decryption Intrusion detection system (IDS) Security Responsibility Password Certificate PII
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Vulnerability
Vishing
Internet service provider (ISP)
Cyber
Personal
Authentication
2FA (Two factor authentication)
Internet
Risk
DMZ
Threat
Username
Malware
Firewall
Malicious
Router
Microsoft 365
OneDrive
Ethernet
Encryption
Suspicious
Intrusion prevention system (IPS)
SharePoint
Data Breach
Server
Email
Website
Identify
Virtual private network (VPN)
Login
Wi-Fi
Decryption
Intrusion detection system (IDS)
Security
Responsibility
Password
Certificate
PII