ThreatVishingClickWebsiteDataBreachDeviceRouterInternetOneDriveInformationResponsibilityServerPHIEmail2FA (Twofactorauthentication)CertificateProtectedIdentifyDMZWi-FiDecryptionLoginAuthenticationMaliciousPIIIntranetFirewallVirtualprivatenetwork(VPN)TLS1.2UsernameEncryptionSecurityVerifySuspiciousIntrusiondetectionsystem(IDS)RiskIntrusionpreventionsystem(IPS)PersonalEthernetMalwareCyberInternetserviceprovider(ISP)PhishingSharePointVulnerabilityPasswordThreatVishingClickWebsiteDataBreachDeviceRouterInternetOneDriveInformationResponsibilityServerPHIEmail2FA (Twofactorauthentication)CertificateProtectedIdentifyDMZWi-FiDecryptionLoginAuthenticationMaliciousPIIIntranetFirewallVirtualprivatenetwork(VPN)TLS1.2UsernameEncryptionSecurityVerifySuspiciousIntrusiondetectionsystem(IDS)RiskIntrusionpreventionsystem(IPS)PersonalEthernetMalwareCyberInternetserviceprovider(ISP)PhishingSharePointVulnerabilityPassword

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
  1. Threat
  2. Vishing
  3. Click
  4. Website
  5. Data Breach
  6. Device
  7. Router
  8. Internet
  9. OneDrive
  10. Information
  11. Responsibility
  12. Server
  13. PHI
  14. Email
  15. 2FA (Two factor authentication)
  16. Certificate
  17. Protected
  18. Identify
  19. DMZ
  20. Wi-Fi
  21. Decryption
  22. Login
  23. Authentication
  24. Malicious
  25. PII
  26. Intranet
  27. Firewall
  28. Virtual private network (VPN)
  29. TLS 1.2
  30. Username
  31. Encryption
  32. Security
  33. Verify
  34. Suspicious
  35. Intrusion detection system (IDS)
  36. Risk
  37. Intrusion prevention system (IPS)
  38. Personal
  39. Ethernet
  40. Malware
  41. Cyber
  42. Internet service provider (ISP)
  43. Phishing
  44. SharePoint
  45. Vulnerability
  46. Password