CompleteCrosswordPuzzleBe caught bysecurityproperlywearing IDbadgeName acybersecuritythreat.Read CyberSecurityDSSpampletAnswerSecurityQuestionShow yoursocial mediaaccount isprivacyprotectedName afamouscybersecurity spyDefinePhishingEmailPASecurityAnswerSecurityQuestionShow phonesecurity withlockedscreenParticipatein "Doc.Lunch"Provide inputfor futuresecuritytrainingGiveexample of asecurecomputerpasswordAnswerSecurityQuestionAsk FSO acybersecurityrelatedquestionParticipatein"CaptionThis"Report asecurityviolationReportSecurityViolationDefineComputerVirusReport asuspiciousemailBe caught bysecurityproperlywearing IDbadgeParticipatein "CyberMovieMontage"AnswerSecurityQuestionCompleteCrosswordPuzzleBe caught bysecurityproperlywearing IDbadgeName acybersecuritythreat.Read CyberSecurityDSSpampletAnswerSecurityQuestionShow yoursocial mediaaccount isprivacyprotectedName afamouscybersecurity spyDefinePhishingEmailPASecurityAnswerSecurityQuestionShow phonesecurity withlockedscreenParticipatein "Doc.Lunch"Provide inputfor futuresecuritytrainingGiveexample of asecurecomputerpasswordAnswerSecurityQuestionAsk FSO acybersecurityrelatedquestionParticipatein"CaptionThis"Report asecurityviolationReportSecurityViolationDefineComputerVirusReport asuspiciousemailBe caught bysecurityproperlywearing IDbadgeParticipatein "CyberMovieMontage"AnswerSecurityQuestion

AAC Cybersecurity Week - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Complete Crossword Puzzle
  2. Be caught by security properly wearing ID badge
  3. Name a cyber security threat.
  4. Read Cyber Security DSS pamplet
  5. Answer Security Question
  6. Show your social media account is privacy protected
  7. Name a famous cyber security spy
  8. Define Phishing
  9. Email PA Security
  10. Answer Security Question
  11. Show phone security with locked screen
  12. Participate in "Doc. Lunch"
  13. Provide input for future security training
  14. Give example of a secure computer password
  15. Answer Security Question
  16. Ask FSO a cyber security related question
  17. Participate in "Caption This"
  18. Report a security violation
  19. Report Security Violation
  20. Define Computer Virus
  21. Report a suspicious email
  22. Be caught by security properly wearing ID badge
  23. Participate in "Cyber Movie Montage"
  24. Answer Security Question