Ask FSO acybersecurityrelatedquestionAnswerSecurityQuestionParticipatein "Doc.Lunch"Show yoursocial mediaaccount isprivacyprotectedParticipatein"CaptionThis"AnswerSecurityQuestionDefineComputerVirusReport asuspiciousemailCompleteCrosswordPuzzleRead CyberSecurityDSSpampletGiveexample of asecurecomputerpasswordShow phonesecurity withlockedscreenBe caught bysecurityproperlywearing IDbadgeReportSecurityViolationName acybersecuritythreat.Be caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestionProvide inputfor futuresecuritytrainingName afamouscybersecurity spyParticipatein "CyberMovieMontage"Report asecurityviolationEmailPASecurityAnswerSecurityQuestionDefinePhishingAsk FSO acybersecurityrelatedquestionAnswerSecurityQuestionParticipatein "Doc.Lunch"Show yoursocial mediaaccount isprivacyprotectedParticipatein"CaptionThis"AnswerSecurityQuestionDefineComputerVirusReport asuspiciousemailCompleteCrosswordPuzzleRead CyberSecurityDSSpampletGiveexample of asecurecomputerpasswordShow phonesecurity withlockedscreenBe caught bysecurityproperlywearing IDbadgeReportSecurityViolationName acybersecuritythreat.Be caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestionProvide inputfor futuresecuritytrainingName afamouscybersecurity spyParticipatein "CyberMovieMontage"Report asecurityviolationEmailPASecurityAnswerSecurityQuestionDefinePhishing

AAC Cybersecurity Week - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Ask FSO a cyber security related question
  2. Answer Security Question
  3. Participate in "Doc. Lunch"
  4. Show your social media account is privacy protected
  5. Participate in "Caption This"
  6. Answer Security Question
  7. Define Computer Virus
  8. Report a suspicious email
  9. Complete Crossword Puzzle
  10. Read Cyber Security DSS pamplet
  11. Give example of a secure computer password
  12. Show phone security with locked screen
  13. Be caught by security properly wearing ID badge
  14. Report Security Violation
  15. Name a cyber security threat.
  16. Be caught by security properly wearing ID badge
  17. Answer Security Question
  18. Provide input for future security training
  19. Name a famous cyber security spy
  20. Participate in "Cyber Movie Montage"
  21. Report a security violation
  22. Email PA Security
  23. Answer Security Question
  24. Define Phishing