Wi-FiDataBreachIntrusionpreventionsystem(IPS)Internetserviceprovider(ISP)PhishingWebsiteMaliciousEmailIdentifyCertificateProtectedServer2FA (Twofactorauthentication)SharePointMicrosoft365VerifyAuthenticationFirewallRouterVirtualprivatenetwork(VPN)InformationResponsibilityVishingOneDriveDecryptionCloudThreatDMZInternetIntrusiondetectionsystem(IDS)LoginRiskPIICyberSuspiciousEthernetEncryptionUsernameSecurityPasswordPersonalClickVulnerabilityMalwareWi-FiDataBreachIntrusionpreventionsystem(IPS)Internetserviceprovider(ISP)PhishingWebsiteMaliciousEmailIdentifyCertificateProtectedServer2FA (Twofactorauthentication)SharePointMicrosoft365VerifyAuthenticationFirewallRouterVirtualprivatenetwork(VPN)InformationResponsibilityVishingOneDriveDecryptionCloudThreatDMZInternetIntrusiondetectionsystem(IDS)LoginRiskPIICyberSuspiciousEthernetEncryptionUsernameSecurityPasswordPersonalClickVulnerabilityMalware

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Wi-Fi
  2. Data Breach
  3. Intrusion prevention system (IPS)
  4. Internet service provider (ISP)
  5. Phishing
  6. Website
  7. Malicious
  8. Email
  9. Identify
  10. Certificate
  11. Protected
  12. Server
  13. 2FA (Two factor authentication)
  14. SharePoint
  15. Microsoft 365
  16. Verify
  17. Authentication
  18. Firewall
  19. Router
  20. Virtual private network (VPN)
  21. Information
  22. Responsibility
  23. Vishing
  24. OneDrive
  25. Decryption
  26. Cloud
  27. Threat
  28. DMZ
  29. Internet
  30. Intrusion detection system (IDS)
  31. Login
  32. Risk
  33. PII
  34. Cyber
  35. Suspicious
  36. Ethernet
  37. Encryption
  38. Username
  39. Security
  40. Password
  41. Personal
  42. Click
  43. Vulnerability
  44. Malware