OperatingSystemSimplicityNetworkTestingProcessIsolationPhysicalAbsractionDataHidingCyberSecurityMinimizationLayeringLeastPrivilegeKeep itsimpleConfidentialityDefensein DepthThink likeanadversaryNetworkApplicationDomainSeparationAvailabilityModularityResourceEncapsulationDataInegrityApplicationTestingOperatingSystemSimplicityNetworkTestingProcessIsolationPhysicalAbsractionDataHidingCyberSecurityMinimizationLayeringLeastPrivilegeKeep itsimpleConfidentialityDefensein DepthThink likeanadversaryNetworkApplicationDomainSeparationAvailabilityModularityResourceEncapsulationDataInegrityApplicationTesting

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Operating System
  2. Simplicity
  3. Network Testing
  4. Process Isolation
  5. Physical
  6. Absraction
  7. Data Hiding
  8. Cyber Security
  9. Minimization
  10. Layering
  11. Least Privilege
  12. Keep it simple
  13. Confidentiality
  14. Defense in Depth
  15. Think like an adversary
  16. Network
  17. Application
  18. Domain Separation
  19. Availability
  20. Modularity
  21. Resource Encapsulation
  22. Data
  23. Inegrity
  24. Application Testing