Intrusiondetectionsystem(IDS)Wi-FiCyberVirtualprivatenetwork(VPN)PIIDecryptionLoginAuthenticationRiskVulnerabilityIdentifyMaliciousCertificateVishingInternetserviceprovider(ISP)EmailInternetPhishingPersonalMalwareResponsibilityIntrusionpreventionsystem(IPS)SharePointThreatDMZEthernetOneDriveMicrosoft365Website2FA (Twofactorauthentication)RouterUsernameFirewallPasswordEncryptionDataBreachSecurityServerSuspiciousIntrusiondetectionsystem(IDS)Wi-FiCyberVirtualprivatenetwork(VPN)PIIDecryptionLoginAuthenticationRiskVulnerabilityIdentifyMaliciousCertificateVishingInternetserviceprovider(ISP)EmailInternetPhishingPersonalMalwareResponsibilityIntrusionpreventionsystem(IPS)SharePointThreatDMZEthernetOneDriveMicrosoft365Website2FA (Twofactorauthentication)RouterUsernameFirewallPasswordEncryptionDataBreachSecurityServerSuspicious

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Intrusion detection system (IDS)
  2. Wi-Fi
  3. Cyber
  4. Virtual private network (VPN)
  5. PII
  6. Decryption
  7. Login
  8. Authentication
  9. Risk
  10. Vulnerability
  11. Identify
  12. Malicious
  13. Certificate
  14. Vishing
  15. Internet service provider (ISP)
  16. Email
  17. Internet
  18. Phishing
  19. Personal
  20. Malware
  21. Responsibility
  22. Intrusion prevention system (IPS)
  23. SharePoint
  24. Threat
  25. DMZ
  26. Ethernet
  27. OneDrive
  28. Microsoft 365
  29. Website
  30. 2FA (Two factor authentication)
  31. Router
  32. Username
  33. Firewall
  34. Password
  35. Encryption
  36. Data Breach
  37. Security
  38. Server
  39. Suspicious