CyberSecurityAvailabilitySimplicityOperatingSystemDataHidingPhysicalLeastPrivilegeLayeringNetworkTestingDefensein DepthThink likeanadversaryResourceEncapsulationDataAbsractionKeep itsimpleApplicationTestingConfidentialityMinimizationModularityDomainSeparationNetworkInegrityProcessIsolationApplicationCyberSecurityAvailabilitySimplicityOperatingSystemDataHidingPhysicalLeastPrivilegeLayeringNetworkTestingDefensein DepthThink likeanadversaryResourceEncapsulationDataAbsractionKeep itsimpleApplicationTestingConfidentialityMinimizationModularityDomainSeparationNetworkInegrityProcessIsolationApplication

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Cyber Security
  2. Availability
  3. Simplicity
  4. Operating System
  5. Data Hiding
  6. Physical
  7. Least Privilege
  8. Layering
  9. Network Testing
  10. Defense in Depth
  11. Think like an adversary
  12. Resource Encapsulation
  13. Data
  14. Absraction
  15. Keep it simple
  16. Application Testing
  17. Confidentiality
  18. Minimization
  19. Modularity
  20. Domain Separation
  21. Network
  22. Inegrity
  23. Process Isolation
  24. Application