Giveexample of asecurecomputerpasswordDefineComputerVirusReportSecurityViolationRead CyberSecurityDSSpampletParticipatein"CaptionThis"Be caught bysecurityproperlywearing IDbadgeReport asecurityviolationParticipatein "Doc.Lunch"AnswerSecurityQuestionEmailPASecurityAnswerSecurityQuestionShow phonesecurity withlockedscreenAsk FSO acybersecurityrelatedquestionCompleteCrosswordPuzzleAnswerSecurityQuestionName afamouscybersecurity spyBe caught bysecurityproperlywearing IDbadgeParticipatein "CyberMovieMontage"Name acybersecuritythreat.AnswerSecurityQuestionShow yoursocial mediaaccount isprivacyprotectedDefinePhishingReport asuspiciousemailProvide inputfor futuresecuritytrainingGiveexample of asecurecomputerpasswordDefineComputerVirusReportSecurityViolationRead CyberSecurityDSSpampletParticipatein"CaptionThis"Be caught bysecurityproperlywearing IDbadgeReport asecurityviolationParticipatein "Doc.Lunch"AnswerSecurityQuestionEmailPASecurityAnswerSecurityQuestionShow phonesecurity withlockedscreenAsk FSO acybersecurityrelatedquestionCompleteCrosswordPuzzleAnswerSecurityQuestionName afamouscybersecurity spyBe caught bysecurityproperlywearing IDbadgeParticipatein "CyberMovieMontage"Name acybersecuritythreat.AnswerSecurityQuestionShow yoursocial mediaaccount isprivacyprotectedDefinePhishingReport asuspiciousemailProvide inputfor futuresecuritytraining

AAC Cybersecurity Week - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Give example of a secure computer password
  2. Define Computer Virus
  3. Report Security Violation
  4. Read Cyber Security DSS pamplet
  5. Participate in "Caption This"
  6. Be caught by security properly wearing ID badge
  7. Report a security violation
  8. Participate in "Doc. Lunch"
  9. Answer Security Question
  10. Email PA Security
  11. Answer Security Question
  12. Show phone security with locked screen
  13. Ask FSO a cyber security related question
  14. Complete Crossword Puzzle
  15. Answer Security Question
  16. Name a famous cyber security spy
  17. Be caught by security properly wearing ID badge
  18. Participate in "Cyber Movie Montage"
  19. Name a cyber security threat.
  20. Answer Security Question
  21. Show your social media account is privacy protected
  22. Define Phishing
  23. Report a suspicious email
  24. Provide input for future security training