AnswerSecurityQuestionRead CyberSecurityDSSpampletName afamouscybersecurity spyReport asecurityviolationGiveexample of asecurecomputerpasswordAsk FSO acybersecurityrelatedquestionParticipatein "CyberMovieMontage"CompleteCrosswordPuzzleProvide inputfor futuresecuritytrainingBe caught bysecurityproperlywearing IDbadgeDefinePhishingAnswerSecurityQuestionReport asuspiciousemailName acybersecuritythreat.Participatein "Doc.Lunch"Participatein"CaptionThis"Be caught bysecurityproperlywearing IDbadgeReportSecurityViolationShow phonesecurity withlockedscreenAnswerSecurityQuestionAnswerSecurityQuestionDefineComputerVirusShow yoursocial mediaaccount isprivacyprotectedEmailPASecurityAnswerSecurityQuestionRead CyberSecurityDSSpampletName afamouscybersecurity spyReport asecurityviolationGiveexample of asecurecomputerpasswordAsk FSO acybersecurityrelatedquestionParticipatein "CyberMovieMontage"CompleteCrosswordPuzzleProvide inputfor futuresecuritytrainingBe caught bysecurityproperlywearing IDbadgeDefinePhishingAnswerSecurityQuestionReport asuspiciousemailName acybersecuritythreat.Participatein "Doc.Lunch"Participatein"CaptionThis"Be caught bysecurityproperlywearing IDbadgeReportSecurityViolationShow phonesecurity withlockedscreenAnswerSecurityQuestionAnswerSecurityQuestionDefineComputerVirusShow yoursocial mediaaccount isprivacyprotectedEmailPASecurity

AAC Cybersecurity Week - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Answer Security Question
  2. Read Cyber Security DSS pamplet
  3. Name a famous cyber security spy
  4. Report a security violation
  5. Give example of a secure computer password
  6. Ask FSO a cyber security related question
  7. Participate in "Cyber Movie Montage"
  8. Complete Crossword Puzzle
  9. Provide input for future security training
  10. Be caught by security properly wearing ID badge
  11. Define Phishing
  12. Answer Security Question
  13. Report a suspicious email
  14. Name a cyber security threat.
  15. Participate in "Doc. Lunch"
  16. Participate in "Caption This"
  17. Be caught by security properly wearing ID badge
  18. Report Security Violation
  19. Show phone security with locked screen
  20. Answer Security Question
  21. Answer Security Question
  22. Define Computer Virus
  23. Show your social media account is privacy protected
  24. Email PA Security