SuspiciousIdentifyMaliciousOneDriveSecurityLoginMalwareIntranetVishingEmailCertificateEthernet2FA (Twofactorauthentication)RouterProtectedPersonalWi-FiSharePointCyberInternetserviceprovider(ISP)DeviceClickPhishingRiskInternetFirewallUsernamePIIPasswordThreatPHIAuthenticationVirtualprivatenetwork(VPN)DecryptionDMZServerResponsibilityIntrusiondetectionsystem(IDS)TLS1.2DataBreachEncryptionVulnerabilityVerifyWebsiteIntrusionpreventionsystem(IPS)InformationSuspiciousIdentifyMaliciousOneDriveSecurityLoginMalwareIntranetVishingEmailCertificateEthernet2FA (Twofactorauthentication)RouterProtectedPersonalWi-FiSharePointCyberInternetserviceprovider(ISP)DeviceClickPhishingRiskInternetFirewallUsernamePIIPasswordThreatPHIAuthenticationVirtualprivatenetwork(VPN)DecryptionDMZServerResponsibilityIntrusiondetectionsystem(IDS)TLS1.2DataBreachEncryptionVulnerabilityVerifyWebsiteIntrusionpreventionsystem(IPS)Information

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
  1. Suspicious
  2. Identify
  3. Malicious
  4. OneDrive
  5. Security
  6. Login
  7. Malware
  8. Intranet
  9. Vishing
  10. Email
  11. Certificate
  12. Ethernet
  13. 2FA (Two factor authentication)
  14. Router
  15. Protected
  16. Personal
  17. Wi-Fi
  18. SharePoint
  19. Cyber
  20. Internet service provider (ISP)
  21. Device
  22. Click
  23. Phishing
  24. Risk
  25. Internet
  26. Firewall
  27. Username
  28. PII
  29. Password
  30. Threat
  31. PHI
  32. Authentication
  33. Virtual private network (VPN)
  34. Decryption
  35. DMZ
  36. Server
  37. Responsibility
  38. Intrusion detection system (IDS)
  39. TLS 1.2
  40. Data Breach
  41. Encryption
  42. Vulnerability
  43. Verify
  44. Website
  45. Intrusion prevention system (IPS)
  46. Information