Be caught bysecurityproperlywearing IDbadgeReportSecurityViolationShow yoursocial mediaaccount isprivacyprotectedName acybersecuritythreat.EmailPASecurityBe caught bysecurityproperlywearing IDbadgeReport asuspiciousemailReport asecurityviolationParticipatein"CaptionThis"AnswerSecurityQuestionAsk FSO acybersecurityrelatedquestionAnswerSecurityQuestionAnswerSecurityQuestionDefineComputerVirusAnswerSecurityQuestionCompleteCrosswordPuzzleName afamouscybersecurity spyRead CyberSecurityDSSpampletShow phonesecurity withlockedscreenProvide inputfor futuresecuritytrainingParticipatein "Doc.Lunch"Participatein "CyberMovieMontage"DefinePhishingGiveexample of asecurecomputerpasswordBe caught bysecurityproperlywearing IDbadgeReportSecurityViolationShow yoursocial mediaaccount isprivacyprotectedName acybersecuritythreat.EmailPASecurityBe caught bysecurityproperlywearing IDbadgeReport asuspiciousemailReport asecurityviolationParticipatein"CaptionThis"AnswerSecurityQuestionAsk FSO acybersecurityrelatedquestionAnswerSecurityQuestionAnswerSecurityQuestionDefineComputerVirusAnswerSecurityQuestionCompleteCrosswordPuzzleName afamouscybersecurity spyRead CyberSecurityDSSpampletShow phonesecurity withlockedscreenProvide inputfor futuresecuritytrainingParticipatein "Doc.Lunch"Participatein "CyberMovieMontage"DefinePhishingGiveexample of asecurecomputerpassword

AAC Cybersecurity Week - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Be caught by security properly wearing ID badge
  2. Report Security Violation
  3. Show your social media account is privacy protected
  4. Name a cyber security threat.
  5. Email PA Security
  6. Be caught by security properly wearing ID badge
  7. Report a suspicious email
  8. Report a security violation
  9. Participate in "Caption This"
  10. Answer Security Question
  11. Ask FSO a cyber security related question
  12. Answer Security Question
  13. Answer Security Question
  14. Define Computer Virus
  15. Answer Security Question
  16. Complete Crossword Puzzle
  17. Name a famous cyber security spy
  18. Read Cyber Security DSS pamplet
  19. Show phone security with locked screen
  20. Provide input for future security training
  21. Participate in "Doc. Lunch"
  22. Participate in "Cyber Movie Montage"
  23. Define Phishing
  24. Give example of a secure computer password