Provide inputfor futuresecuritytrainingAsk FSO acybersecurityrelatedquestionReport asuspiciousemailDefineComputerVirusBe caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestionAnswerSecurityQuestionName afamouscybersecurity spyAnswerSecurityQuestionShow phonesecurity withlockedscreenAnswerSecurityQuestionReportSecurityViolationReport asecurityviolationParticipatein "CyberMovieMontage"Be caught bysecurityproperlywearing IDbadgeParticipatein "Doc.Lunch"DefinePhishingCompleteCrosswordPuzzleRead CyberSecurityDSSpampletShow yoursocial mediaaccount isprivacyprotectedParticipatein"CaptionThis"Name acybersecuritythreat.EmailPASecurityGiveexample of asecurecomputerpasswordProvide inputfor futuresecuritytrainingAsk FSO acybersecurityrelatedquestionReport asuspiciousemailDefineComputerVirusBe caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestionAnswerSecurityQuestionName afamouscybersecurity spyAnswerSecurityQuestionShow phonesecurity withlockedscreenAnswerSecurityQuestionReportSecurityViolationReport asecurityviolationParticipatein "CyberMovieMontage"Be caught bysecurityproperlywearing IDbadgeParticipatein "Doc.Lunch"DefinePhishingCompleteCrosswordPuzzleRead CyberSecurityDSSpampletShow yoursocial mediaaccount isprivacyprotectedParticipatein"CaptionThis"Name acybersecuritythreat.EmailPASecurityGiveexample of asecurecomputerpassword

AAC Cybersecurity Week - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Provide input for future security training
  2. Ask FSO a cyber security related question
  3. Report a suspicious email
  4. Define Computer Virus
  5. Be caught by security properly wearing ID badge
  6. Answer Security Question
  7. Answer Security Question
  8. Name a famous cyber security spy
  9. Answer Security Question
  10. Show phone security with locked screen
  11. Answer Security Question
  12. Report Security Violation
  13. Report a security violation
  14. Participate in "Cyber Movie Montage"
  15. Be caught by security properly wearing ID badge
  16. Participate in "Doc. Lunch"
  17. Define Phishing
  18. Complete Crossword Puzzle
  19. Read Cyber Security DSS pamplet
  20. Show your social media account is privacy protected
  21. Participate in "Caption This"
  22. Name a cyber security threat.
  23. Email PA Security
  24. Give example of a secure computer password