IDSmalwareconfidentialityidentitythefttrainingexploitescalationinsiderthreatvirusSyssecAdmincyberattackMFAfirewallpentestsmishingvishingspamEDRvulnerabilityzero-dayresilienceriskantivirusIPScomplianceHIPAAVPNIPPIIAPTWISPpassphrasesecurityawarenesshackerspywareriskassessmentransomwarenetworkSecurityOperationsrootkitCIAtriadIoTbusinesscontinuitypacketencryptionPHIFTPadminDarkWebbugBECsecuritypolicyphishingwormintegritypasswordbreachDefense-in-depthcryptographysocialengineeringspoofingbotnetCyberSecurityavailabilityIOCincidentresponseDDoSCyberDefenseincidentOSdefenseevasionIDSmalwareconfidentialityidentitythefttrainingexploitescalationinsiderthreatvirusSyssecAdmincyberattackMFAfirewallpentestsmishingvishingspamEDRvulnerabilityzero-dayresilienceriskantivirusIPScomplianceHIPAAVPNIPPIIAPTWISPpassphrasesecurityawarenesshackerspywareriskassessmentransomwarenetworkSecurityOperationsrootkitCIAtriadIoTbusinesscontinuitypacketencryptionPHIFTPadminDarkWebbugBECsecuritypolicyphishingwormintegritypasswordbreachDefense-in-depthcryptographysocialengineeringspoofingbotnetCyberSecurityavailabilityIOCincidentresponseDDoSCyberDefenseincidentOSdefenseevasion

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
  1. IDS
  2. malware
  3. confidentiality
  4. identity theft
  5. training
  6. exploit
  7. escalation
  8. insider threat
  9. virus
  10. SyssecAdmin
  11. cyber attack
  12. MFA
  13. firewall
  14. pentest
  15. smishing
  16. vishing
  17. spam
  18. EDR
  19. vulnerability
  20. zero-day
  21. resilience
  22. risk
  23. antivirus
  24. IPS
  25. compliance
  26. HIPAA
  27. VPN
  28. IP
  29. PII
  30. APT
  31. WISP
  32. passphrase
  33. security awareness
  34. hacker
  35. spyware
  36. risk assessment
  37. ransomware
  38. network
  39. Security Operations
  40. rootkit
  41. CIA triad
  42. IoT
  43. business continuity
  44. packet
  45. encryption
  46. PHI
  47. FTP
  48. admin
  49. Dark Web
  50. bug
  51. BEC
  52. security policy
  53. phishing
  54. worm
  55. integrity
  56. password
  57. breach
  58. Defense-in-depth
  59. cryptography
  60. social engineering
  61. spoofing
  62. botnet
  63. Cyber Security
  64. availability
  65. IOC
  66. incident response
  67. DDoS
  68. Cyber Defense
  69. incident
  70. OS
  71. defense evasion