(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
34. Transport Layer Security (TLS)
6. Phishing
3. Encryption
14. Insider Threat
37. Biometrics
9. Trojan
47. Physical Security
16. Zero-Day
36. Security Awareness
41. Public Key Infrastructure (PKI)
10. Virus
18. Access Control
5. Malware
40. Data Encryption Standard (DES)
45. Certificate Authority
32. Intrusion Detection
22. Threat Intelligence
49. Access Logs
38. Cloud Security
26. Security Policy
15. Social Engineering
31. Denial-of-Service (DoS)
4. Firewall
23. Incident Response
43. Session Hijacking
7. Ransomware
27. Penetration Testing
12. Patch
42. Security Audit
33. Secure Socket Layer (SSL)
29. Backup
30. Recovery Plan
28. Data Leak
2. Authorization
25. Compliance
21. Data Privacy
50. Network Segmentation
1. Authentication
46. Secure Coding
13. Breach
35. Digital Signature
8. Spyware
44. Tokenization
20. Cyber Attack
39. Identity Theft
24. Risk Assessment
17. Multi-Factor Authentication (MFA)
11. Vulnerability
48. Security Information and Event Management (SIEM)