LeastPrivilegeModularityMinimizationKeep itsimpleAvailabilityCyberSecurityAbsractionApplicationResourceEncapsulationApplicationTestingInegrityDataHidingLayeringDomainSeparationPhysicalSimplicityProcessIsolationOperatingSystemNetworkConfidentialityDefensein DepthThink likeanadversaryDataNetworkTestingLeastPrivilegeModularityMinimizationKeep itsimpleAvailabilityCyberSecurityAbsractionApplicationResourceEncapsulationApplicationTestingInegrityDataHidingLayeringDomainSeparationPhysicalSimplicityProcessIsolationOperatingSystemNetworkConfidentialityDefensein DepthThink likeanadversaryDataNetworkTesting

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Least Privilege
  2. Modularity
  3. Minimization
  4. Keep it simple
  5. Availability
  6. Cyber Security
  7. Absraction
  8. Application
  9. Resource Encapsulation
  10. Application Testing
  11. Inegrity
  12. Data Hiding
  13. Layering
  14. Domain Separation
  15. Physical
  16. Simplicity
  17. Process Isolation
  18. Operating System
  19. Network
  20. Confidentiality
  21. Defense in Depth
  22. Think like an adversary
  23. Data
  24. Network Testing