Internetserviceprovider(ISP)Security2FA (Twofactorauthentication)Intrusiondetectionsystem(IDS)EncryptionLoginRouterPasswordThreatUsernameEmailRiskMicrosoft365Virtualprivatenetwork(VPN)Wi-FiPhishingInternetServerOneDriveFirewallMalwareWebsiteDMZSharePointDataBreachMaliciousAuthenticationSuspiciousIntrusionpreventionsystem(IPS)ResponsibilityVishingVulnerabilityIdentifyEthernetPIICyberPersonalDecryptionCertificateInternetserviceprovider(ISP)Security2FA (Twofactorauthentication)Intrusiondetectionsystem(IDS)EncryptionLoginRouterPasswordThreatUsernameEmailRiskMicrosoft365Virtualprivatenetwork(VPN)Wi-FiPhishingInternetServerOneDriveFirewallMalwareWebsiteDMZSharePointDataBreachMaliciousAuthenticationSuspiciousIntrusionpreventionsystem(IPS)ResponsibilityVishingVulnerabilityIdentifyEthernetPIICyberPersonalDecryptionCertificate

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Internet service provider (ISP)
  2. Security
  3. 2FA (Two factor authentication)
  4. Intrusion detection system (IDS)
  5. Encryption
  6. Login
  7. Router
  8. Password
  9. Threat
  10. Username
  11. Email
  12. Risk
  13. Microsoft 365
  14. Virtual private network (VPN)
  15. Wi-Fi
  16. Phishing
  17. Internet
  18. Server
  19. OneDrive
  20. Firewall
  21. Malware
  22. Website
  23. DMZ
  24. SharePoint
  25. Data Breach
  26. Malicious
  27. Authentication
  28. Suspicious
  29. Intrusion prevention system (IPS)
  30. Responsibility
  31. Vishing
  32. Vulnerability
  33. Identify
  34. Ethernet
  35. PII
  36. Cyber
  37. Personal
  38. Decryption
  39. Certificate