Name acybersecuritythreat.Participatein "CyberMovieMontage"Participatein "Doc.Lunch"Giveexample of asecurecomputerpasswordShow yoursocial mediaaccount isprivacyprotectedDefinePhishingParticipatein"CaptionThis"CompleteCrosswordPuzzleProvide inputfor futuresecuritytrainingAsk FSO acybersecurityrelatedquestionReport asuspiciousemailReport asecurityviolationAnswerSecurityQuestionRead CyberSecurityDSSpampletReportSecurityViolationDefineComputerVirusAnswerSecurityQuestionEmailPASecurityAnswerSecurityQuestionShow phonesecurity withlockedscreenBe caught bysecurityproperlywearing IDbadgeName afamouscybersecurity spyBe caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestionName acybersecuritythreat.Participatein "CyberMovieMontage"Participatein "Doc.Lunch"Giveexample of asecurecomputerpasswordShow yoursocial mediaaccount isprivacyprotectedDefinePhishingParticipatein"CaptionThis"CompleteCrosswordPuzzleProvide inputfor futuresecuritytrainingAsk FSO acybersecurityrelatedquestionReport asuspiciousemailReport asecurityviolationAnswerSecurityQuestionRead CyberSecurityDSSpampletReportSecurityViolationDefineComputerVirusAnswerSecurityQuestionEmailPASecurityAnswerSecurityQuestionShow phonesecurity withlockedscreenBe caught bysecurityproperlywearing IDbadgeName afamouscybersecurity spyBe caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestion

AAC Cybersecurity Week - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Name a cyber security threat.
  2. Participate in "Cyber Movie Montage"
  3. Participate in "Doc. Lunch"
  4. Give example of a secure computer password
  5. Show your social media account is privacy protected
  6. Define Phishing
  7. Participate in "Caption This"
  8. Complete Crossword Puzzle
  9. Provide input for future security training
  10. Ask FSO a cyber security related question
  11. Report a suspicious email
  12. Report a security violation
  13. Answer Security Question
  14. Read Cyber Security DSS pamplet
  15. Report Security Violation
  16. Define Computer Virus
  17. Answer Security Question
  18. Email PA Security
  19. Answer Security Question
  20. Show phone security with locked screen
  21. Be caught by security properly wearing ID badge
  22. Name a famous cyber security spy
  23. Be caught by security properly wearing ID badge
  24. Answer Security Question