PIIVishingCyberPhishingVulnerabilityPasswordPersonalInformationVirtualprivatenetwork(VPN)Wi-FiEncryptionIntrusionpreventionsystem(IPS)IdentifySharePointThreatAuthenticationInternetEthernetServerMalwareCloudSecurityRouterRiskResponsibilityMaliciousProtected2FA (Twofactorauthentication)Internetserviceprovider(ISP)CertificateVerifyDMZOneDriveUsernameEmailSuspiciousClickWebsiteFirewallLoginIntrusiondetectionsystem(IDS)Microsoft365DataBreachDecryptionPIIVishingCyberPhishingVulnerabilityPasswordPersonalInformationVirtualprivatenetwork(VPN)Wi-FiEncryptionIntrusionpreventionsystem(IPS)IdentifySharePointThreatAuthenticationInternetEthernetServerMalwareCloudSecurityRouterRiskResponsibilityMaliciousProtected2FA (Twofactorauthentication)Internetserviceprovider(ISP)CertificateVerifyDMZOneDriveUsernameEmailSuspiciousClickWebsiteFirewallLoginIntrusiondetectionsystem(IDS)Microsoft365DataBreachDecryption

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. PII
  2. Vishing
  3. Cyber
  4. Phishing
  5. Vulnerability
  6. Password
  7. Personal
  8. Information
  9. Virtual private network (VPN)
  10. Wi-Fi
  11. Encryption
  12. Intrusion prevention system (IPS)
  13. Identify
  14. SharePoint
  15. Threat
  16. Authentication
  17. Internet
  18. Ethernet
  19. Server
  20. Malware
  21. Cloud
  22. Security
  23. Router
  24. Risk
  25. Responsibility
  26. Malicious
  27. Protected
  28. 2FA (Two factor authentication)
  29. Internet service provider (ISP)
  30. Certificate
  31. Verify
  32. DMZ
  33. OneDrive
  34. Username
  35. Email
  36. Suspicious
  37. Click
  38. Website
  39. Firewall
  40. Login
  41. Intrusion detection system (IDS)
  42. Microsoft 365
  43. Data Breach
  44. Decryption