rootkitwormsecurityawarenessBECHIPAACIAtriadbreachfirewallIoTPHIriskincidentresponseAPTDarkWebsocialengineeringspoofingpassphraseCyberDefenseresiliencetrainingCyberSecurityOSconfidentialityIDSvulnerabilityDefense-in-depthexploitinsiderthreatcomplianceriskassessmentadminIPcryptographyMFAEDRWISPvirusFTPspamspywareintegrityescalationidentitytheftencryptionSecurityOperationspentestDDoSsecuritypolicycyberattacknetworkbugdefenseevasionransomwarepacketSyssecAdminbusinesscontinuityVPNhackerPIIincidentzero-daymalwarebotnetavailabilityantivirussmishingIPSpasswordphishingvishingIOCrootkitwormsecurityawarenessBECHIPAACIAtriadbreachfirewallIoTPHIriskincidentresponseAPTDarkWebsocialengineeringspoofingpassphraseCyberDefenseresiliencetrainingCyberSecurityOSconfidentialityIDSvulnerabilityDefense-in-depthexploitinsiderthreatcomplianceriskassessmentadminIPcryptographyMFAEDRWISPvirusFTPspamspywareintegrityescalationidentitytheftencryptionSecurityOperationspentestDDoSsecuritypolicycyberattacknetworkbugdefenseevasionransomwarepacketSyssecAdminbusinesscontinuityVPNhackerPIIincidentzero-daymalwarebotnetavailabilityantivirussmishingIPSpasswordphishingvishingIOC

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
  1. rootkit
  2. worm
  3. security awareness
  4. BEC
  5. HIPAA
  6. CIA triad
  7. breach
  8. firewall
  9. IoT
  10. PHI
  11. risk
  12. incident response
  13. APT
  14. Dark Web
  15. social engineering
  16. spoofing
  17. passphrase
  18. Cyber Defense
  19. resilience
  20. training
  21. Cyber Security
  22. OS
  23. confidentiality
  24. IDS
  25. vulnerability
  26. Defense-in-depth
  27. exploit
  28. insider threat
  29. compliance
  30. risk assessment
  31. admin
  32. IP
  33. cryptography
  34. MFA
  35. EDR
  36. WISP
  37. virus
  38. FTP
  39. spam
  40. spyware
  41. integrity
  42. escalation
  43. identity theft
  44. encryption
  45. Security Operations
  46. pentest
  47. DDoS
  48. security policy
  49. cyber attack
  50. network
  51. bug
  52. defense evasion
  53. ransomware
  54. packet
  55. SyssecAdmin
  56. business continuity
  57. VPN
  58. hacker
  59. PII
  60. incident
  61. zero-day
  62. malware
  63. botnet
  64. availability
  65. antivirus
  66. smishing
  67. IPS
  68. password
  69. phishing
  70. vishing
  71. IOC