MaliciousDecryptionThreatCertificateClickDataBreachServerRiskSecurityIdentifyPhishingInternetVishingWi-FiEthernetUsernameCloudMaliciousEncryptionMicrosoft365PersonalSuspiciousDMZInformation2FA (Twofactorauthentication)FirewallAuthenticationMalwareRouterVirtualprivatenetwork(VPN)ResponsibilityInternetserviceprovider(ISP)ProtectedSharePointVulnerabilityIntrusiondetectionsystem(IDS)VerifyWebsiteIntrusionpreventionsystem(IPS)CyberPasswordOneDriveEmailLoginPIIMaliciousDecryptionThreatCertificateClickDataBreachServerRiskSecurityIdentifyPhishingInternetVishingWi-FiEthernetUsernameCloudMaliciousEncryptionMicrosoft365PersonalSuspiciousDMZInformation2FA (Twofactorauthentication)FirewallAuthenticationMalwareRouterVirtualprivatenetwork(VPN)ResponsibilityInternetserviceprovider(ISP)ProtectedSharePointVulnerabilityIntrusiondetectionsystem(IDS)VerifyWebsiteIntrusionpreventionsystem(IPS)CyberPasswordOneDriveEmailLoginPII

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Malicious
  2. Decryption
  3. Threat
  4. Certificate
  5. Click
  6. Data Breach
  7. Server
  8. Risk
  9. Security
  10. Identify
  11. Phishing
  12. Internet
  13. Vishing
  14. Wi-Fi
  15. Ethernet
  16. Username
  17. Cloud
  18. Malicious
  19. Encryption
  20. Microsoft 365
  21. Personal
  22. Suspicious
  23. DMZ
  24. Information
  25. 2FA (Two factor authentication)
  26. Firewall
  27. Authentication
  28. Malware
  29. Router
  30. Virtual private network (VPN)
  31. Responsibility
  32. Internet service provider (ISP)
  33. Protected
  34. SharePoint
  35. Vulnerability
  36. Intrusion detection system (IDS)
  37. Verify
  38. Website
  39. Intrusion prevention system (IPS)
  40. Cyber
  41. Password
  42. OneDrive
  43. Email
  44. Login
  45. PII