NetworkConfidentialityLeastPrivilegeModularityDataSimplicityMinimizationInegrityKeep itsimpleDataHidingResourceEncapsulationApplicationPhysicalThink likeanadversaryCyberSecurityLayeringDefensein DepthProcessIsolationOperatingSystemNetworkTestingApplicationTestingDomainSeparationAvailabilityAbsractionNetworkConfidentialityLeastPrivilegeModularityDataSimplicityMinimizationInegrityKeep itsimpleDataHidingResourceEncapsulationApplicationPhysicalThink likeanadversaryCyberSecurityLayeringDefensein DepthProcessIsolationOperatingSystemNetworkTestingApplicationTestingDomainSeparationAvailabilityAbsraction

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Network
  2. Confidentiality
  3. Least Privilege
  4. Modularity
  5. Data
  6. Simplicity
  7. Minimization
  8. Inegrity
  9. Keep it simple
  10. Data Hiding
  11. Resource Encapsulation
  12. Application
  13. Physical
  14. Think like an adversary
  15. Cyber Security
  16. Layering
  17. Defense in Depth
  18. Process Isolation
  19. Operating System
  20. Network Testing
  21. Application Testing
  22. Domain Separation
  23. Availability
  24. Absraction