Name acybersecuritythreat.AnswerSecurityQuestionAnswerSecurityQuestionAnswerSecurityQuestionGiveexample of asecurecomputerpasswordBe caught bysecurityproperlywearing IDbadgeShow yoursocial mediaaccount isprivacyprotectedDefinePhishingRead CyberSecurityDSSpampletParticipatein "Doc.Lunch"Report asuspiciousemailDefineComputerVirusReport asecurityviolationReportSecurityViolationCompleteCrosswordPuzzleBe caught bysecurityproperlywearing IDbadgeProvide inputfor futuresecuritytrainingParticipatein"CaptionThis"Ask FSO acybersecurityrelatedquestionName afamouscybersecurity spyParticipatein "CyberMovieMontage"Show phonesecurity withlockedscreenAnswerSecurityQuestionEmailPASecurityName acybersecuritythreat.AnswerSecurityQuestionAnswerSecurityQuestionAnswerSecurityQuestionGiveexample of asecurecomputerpasswordBe caught bysecurityproperlywearing IDbadgeShow yoursocial mediaaccount isprivacyprotectedDefinePhishingRead CyberSecurityDSSpampletParticipatein "Doc.Lunch"Report asuspiciousemailDefineComputerVirusReport asecurityviolationReportSecurityViolationCompleteCrosswordPuzzleBe caught bysecurityproperlywearing IDbadgeProvide inputfor futuresecuritytrainingParticipatein"CaptionThis"Ask FSO acybersecurityrelatedquestionName afamouscybersecurity spyParticipatein "CyberMovieMontage"Show phonesecurity withlockedscreenAnswerSecurityQuestionEmailPASecurity

AAC Cybersecurity Week - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Name a cyber security threat.
  2. Answer Security Question
  3. Answer Security Question
  4. Answer Security Question
  5. Give example of a secure computer password
  6. Be caught by security properly wearing ID badge
  7. Show your social media account is privacy protected
  8. Define Phishing
  9. Read Cyber Security DSS pamplet
  10. Participate in "Doc. Lunch"
  11. Report a suspicious email
  12. Define Computer Virus
  13. Report a security violation
  14. Report Security Violation
  15. Complete Crossword Puzzle
  16. Be caught by security properly wearing ID badge
  17. Provide input for future security training
  18. Participate in "Caption This"
  19. Ask FSO a cyber security related question
  20. Name a famous cyber security spy
  21. Participate in "Cyber Movie Montage"
  22. Show phone security with locked screen
  23. Answer Security Question
  24. Email PA Security