ResourceEncapsulationApplicationTestingAbsractionAvailabilityDefensein DepthOperatingSystemPhysicalDomainSeparationNetworkTestingDataHidingDataInegrityMinimizationThink likeanadversaryLayeringApplicationCyberSecurityLeastPrivilegeNetworkModularityProcessIsolationKeep itsimpleSimplicityConfidentialityResourceEncapsulationApplicationTestingAbsractionAvailabilityDefensein DepthOperatingSystemPhysicalDomainSeparationNetworkTestingDataHidingDataInegrityMinimizationThink likeanadversaryLayeringApplicationCyberSecurityLeastPrivilegeNetworkModularityProcessIsolationKeep itsimpleSimplicityConfidentiality

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Resource Encapsulation
  2. Application Testing
  3. Absraction
  4. Availability
  5. Defense in Depth
  6. Operating System
  7. Physical
  8. Domain Separation
  9. Network Testing
  10. Data Hiding
  11. Data
  12. Inegrity
  13. Minimization
  14. Think like an adversary
  15. Layering
  16. Application
  17. Cyber Security
  18. Least Privilege
  19. Network
  20. Modularity
  21. Process Isolation
  22. Keep it simple
  23. Simplicity
  24. Confidentiality