DefinePhishingShow phonesecurity withlockedscreenShow yoursocial mediaaccount isprivacyprotectedParticipatein"CaptionThis"Name acybersecuritythreat.Provide inputfor futuresecuritytrainingDefineComputerVirusEmailPASecurityReportSecurityViolationCompleteCrosswordPuzzleRead CyberSecurityDSSpampletName afamouscybersecurity spyBe caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestionParticipatein "CyberMovieMontage"AnswerSecurityQuestionAnswerSecurityQuestionParticipatein "Doc.Lunch"AnswerSecurityQuestionAsk FSO acybersecurityrelatedquestionBe caught bysecurityproperlywearing IDbadgeReport asuspiciousemailGiveexample of asecurecomputerpasswordReport asecurityviolationDefinePhishingShow phonesecurity withlockedscreenShow yoursocial mediaaccount isprivacyprotectedParticipatein"CaptionThis"Name acybersecuritythreat.Provide inputfor futuresecuritytrainingDefineComputerVirusEmailPASecurityReportSecurityViolationCompleteCrosswordPuzzleRead CyberSecurityDSSpampletName afamouscybersecurity spyBe caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestionParticipatein "CyberMovieMontage"AnswerSecurityQuestionAnswerSecurityQuestionParticipatein "Doc.Lunch"AnswerSecurityQuestionAsk FSO acybersecurityrelatedquestionBe caught bysecurityproperlywearing IDbadgeReport asuspiciousemailGiveexample of asecurecomputerpasswordReport asecurityviolation

AAC Cybersecurity Week - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Define Phishing
  2. Show phone security with locked screen
  3. Show your social media account is privacy protected
  4. Participate in "Caption This"
  5. Name a cyber security threat.
  6. Provide input for future security training
  7. Define Computer Virus
  8. Email PA Security
  9. Report Security Violation
  10. Complete Crossword Puzzle
  11. Read Cyber Security DSS pamplet
  12. Name a famous cyber security spy
  13. Be caught by security properly wearing ID badge
  14. Answer Security Question
  15. Participate in "Cyber Movie Montage"
  16. Answer Security Question
  17. Answer Security Question
  18. Participate in "Doc. Lunch"
  19. Answer Security Question
  20. Ask FSO a cyber security related question
  21. Be caught by security properly wearing ID badge
  22. Report a suspicious email
  23. Give example of a secure computer password
  24. Report a security violation