ResourceEncapsulationDataHidingLeastPrivilegeKeep itsimpleDataProcessIsolationLayeringApplicationTestingAbsractionDomainSeparationApplicationNetworkInegrityConfidentialityDefensein DepthAvailabilityMinimizationOperatingSystemNetworkTestingModularitySimplicityPhysicalCyberSecurityThink likeanadversaryResourceEncapsulationDataHidingLeastPrivilegeKeep itsimpleDataProcessIsolationLayeringApplicationTestingAbsractionDomainSeparationApplicationNetworkInegrityConfidentialityDefensein DepthAvailabilityMinimizationOperatingSystemNetworkTestingModularitySimplicityPhysicalCyberSecurityThink likeanadversary

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Resource Encapsulation
  2. Data Hiding
  3. Least Privilege
  4. Keep it simple
  5. Data
  6. Process Isolation
  7. Layering
  8. Application Testing
  9. Absraction
  10. Domain Separation
  11. Application
  12. Network
  13. Inegrity
  14. Confidentiality
  15. Defense in Depth
  16. Availability
  17. Minimization
  18. Operating System
  19. Network Testing
  20. Modularity
  21. Simplicity
  22. Physical
  23. Cyber Security
  24. Think like an adversary