Be caught bysecurityproperlywearing IDbadgeReport asecurityviolationParticipatein "CyberMovieMontage"AnswerSecurityQuestionDefinePhishingGiveexample of asecurecomputerpasswordEmailPASecurityCompleteCrosswordPuzzleShow yoursocial mediaaccount isprivacyprotectedShow phonesecurity withlockedscreenName afamouscybersecurity spyReportSecurityViolationAnswerSecurityQuestionBe caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestionName acybersecuritythreat.Ask FSO acybersecurityrelatedquestionAnswerSecurityQuestionDefineComputerVirusParticipatein"CaptionThis"Report asuspiciousemailParticipatein "Doc.Lunch"Provide inputfor futuresecuritytrainingRead CyberSecurityDSSpampletBe caught bysecurityproperlywearing IDbadgeReport asecurityviolationParticipatein "CyberMovieMontage"AnswerSecurityQuestionDefinePhishingGiveexample of asecurecomputerpasswordEmailPASecurityCompleteCrosswordPuzzleShow yoursocial mediaaccount isprivacyprotectedShow phonesecurity withlockedscreenName afamouscybersecurity spyReportSecurityViolationAnswerSecurityQuestionBe caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestionName acybersecuritythreat.Ask FSO acybersecurityrelatedquestionAnswerSecurityQuestionDefineComputerVirusParticipatein"CaptionThis"Report asuspiciousemailParticipatein "Doc.Lunch"Provide inputfor futuresecuritytrainingRead CyberSecurityDSSpamplet

AAC Cybersecurity Week - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Be caught by security properly wearing ID badge
  2. Report a security violation
  3. Participate in "Cyber Movie Montage"
  4. Answer Security Question
  5. Define Phishing
  6. Give example of a secure computer password
  7. Email PA Security
  8. Complete Crossword Puzzle
  9. Show your social media account is privacy protected
  10. Show phone security with locked screen
  11. Name a famous cyber security spy
  12. Report Security Violation
  13. Answer Security Question
  14. Be caught by security properly wearing ID badge
  15. Answer Security Question
  16. Name a cyber security threat.
  17. Ask FSO a cyber security related question
  18. Answer Security Question
  19. Define Computer Virus
  20. Participate in "Caption This"
  21. Report a suspicious email
  22. Participate in "Doc. Lunch"
  23. Provide input for future security training
  24. Read Cyber Security DSS pamplet