VulnerabilityVishingPhishingOneDriveServerFirewallCertificateIntrusiondetectionsystem(IDS)InformationPersonalUsernameEmailMicrosoft365ClickEncryptionCyberThreatProtectedIdentifyDecryptionPIIVirtualprivatenetwork(VPN)ResponsibilityPasswordVerifyAuthenticationRiskEthernet2FA (Twofactorauthentication)Intrusionpreventionsystem(IPS)SuspiciousMaliciousDataBreachRouterInternetserviceprovider(ISP)SharePointMaliciousLoginCloudSecurityDMZWebsiteMalwareInternetWi-FiVulnerabilityVishingPhishingOneDriveServerFirewallCertificateIntrusiondetectionsystem(IDS)InformationPersonalUsernameEmailMicrosoft365ClickEncryptionCyberThreatProtectedIdentifyDecryptionPIIVirtualprivatenetwork(VPN)ResponsibilityPasswordVerifyAuthenticationRiskEthernet2FA (Twofactorauthentication)Intrusionpreventionsystem(IPS)SuspiciousMaliciousDataBreachRouterInternetserviceprovider(ISP)SharePointMaliciousLoginCloudSecurityDMZWebsiteMalwareInternetWi-Fi

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Vulnerability
  2. Vishing
  3. Phishing
  4. OneDrive
  5. Server
  6. Firewall
  7. Certificate
  8. Intrusion detection system (IDS)
  9. Information
  10. Personal
  11. Username
  12. Email
  13. Microsoft 365
  14. Click
  15. Encryption
  16. Cyber
  17. Threat
  18. Protected
  19. Identify
  20. Decryption
  21. PII
  22. Virtual private network (VPN)
  23. Responsibility
  24. Password
  25. Verify
  26. Authentication
  27. Risk
  28. Ethernet
  29. 2FA (Two factor authentication)
  30. Intrusion prevention system (IPS)
  31. Suspicious
  32. Malicious
  33. Data Breach
  34. Router
  35. Internet service provider (ISP)
  36. SharePoint
  37. Malicious
  38. Login
  39. Cloud
  40. Security
  41. DMZ
  42. Website
  43. Malware
  44. Internet
  45. Wi-Fi