InformationMalwareWebsiteUsernameEmailFirewallPhishingRouterEthernetInternetSecurityCyberThreatVirtualprivatenetwork(VPN)Microsoft3652FA (Twofactorauthentication)Intrusionpreventionsystem(IPS)CloudDecryptionRiskProtectedClickPIIOneDriveWi-FiIntrusiondetectionsystem(IDS)ResponsibilityVishingVulnerabilityMaliciousDMZEncryptionAuthenticationDataBreachSharePointSuspiciousLoginCertificatePersonalPasswordIdentifyInternetserviceprovider(ISP)ServerVerifyMaliciousInformationMalwareWebsiteUsernameEmailFirewallPhishingRouterEthernetInternetSecurityCyberThreatVirtualprivatenetwork(VPN)Microsoft3652FA (Twofactorauthentication)Intrusionpreventionsystem(IPS)CloudDecryptionRiskProtectedClickPIIOneDriveWi-FiIntrusiondetectionsystem(IDS)ResponsibilityVishingVulnerabilityMaliciousDMZEncryptionAuthenticationDataBreachSharePointSuspiciousLoginCertificatePersonalPasswordIdentifyInternetserviceprovider(ISP)ServerVerifyMalicious

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Information
  2. Malware
  3. Website
  4. Username
  5. Email
  6. Firewall
  7. Phishing
  8. Router
  9. Ethernet
  10. Internet
  11. Security
  12. Cyber
  13. Threat
  14. Virtual private network (VPN)
  15. Microsoft 365
  16. 2FA (Two factor authentication)
  17. Intrusion prevention system (IPS)
  18. Cloud
  19. Decryption
  20. Risk
  21. Protected
  22. Click
  23. PII
  24. OneDrive
  25. Wi-Fi
  26. Intrusion detection system (IDS)
  27. Responsibility
  28. Vishing
  29. Vulnerability
  30. Malicious
  31. DMZ
  32. Encryption
  33. Authentication
  34. Data Breach
  35. SharePoint
  36. Suspicious
  37. Login
  38. Certificate
  39. Personal
  40. Password
  41. Identify
  42. Internet service provider (ISP)
  43. Server
  44. Verify
  45. Malicious