Giveexample of asecurecomputerpasswordReport asecurityviolationDefineComputerVirusName afamouscybersecurity spyBe caught bysecurityproperlywearing IDbadgeName acybersecuritythreat.AnswerSecurityQuestionRead CyberSecurityDSSpampletParticipatein "CyberMovieMontage"Be caught bysecurityproperlywearing IDbadgeParticipatein"CaptionThis"AnswerSecurityQuestionCompleteCrosswordPuzzleAsk FSO acybersecurityrelatedquestionAnswerSecurityQuestionDefinePhishingAnswerSecurityQuestionParticipatein "Doc.Lunch"ReportSecurityViolationShow phonesecurity withlockedscreenShow yoursocial mediaaccount isprivacyprotectedEmailPASecurityProvide inputfor futuresecuritytrainingReport asuspiciousemailGiveexample of asecurecomputerpasswordReport asecurityviolationDefineComputerVirusName afamouscybersecurity spyBe caught bysecurityproperlywearing IDbadgeName acybersecuritythreat.AnswerSecurityQuestionRead CyberSecurityDSSpampletParticipatein "CyberMovieMontage"Be caught bysecurityproperlywearing IDbadgeParticipatein"CaptionThis"AnswerSecurityQuestionCompleteCrosswordPuzzleAsk FSO acybersecurityrelatedquestionAnswerSecurityQuestionDefinePhishingAnswerSecurityQuestionParticipatein "Doc.Lunch"ReportSecurityViolationShow phonesecurity withlockedscreenShow yoursocial mediaaccount isprivacyprotectedEmailPASecurityProvide inputfor futuresecuritytrainingReport asuspiciousemail

AAC Cybersecurity Week - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Give example of a secure computer password
  2. Report a security violation
  3. Define Computer Virus
  4. Name a famous cyber security spy
  5. Be caught by security properly wearing ID badge
  6. Name a cyber security threat.
  7. Answer Security Question
  8. Read Cyber Security DSS pamplet
  9. Participate in "Cyber Movie Montage"
  10. Be caught by security properly wearing ID badge
  11. Participate in "Caption This"
  12. Answer Security Question
  13. Complete Crossword Puzzle
  14. Ask FSO a cyber security related question
  15. Answer Security Question
  16. Define Phishing
  17. Answer Security Question
  18. Participate in "Doc. Lunch"
  19. Report Security Violation
  20. Show phone security with locked screen
  21. Show your social media account is privacy protected
  22. Email PA Security
  23. Provide input for future security training
  24. Report a suspicious email