PIIFirewallCyberMalwareIdentifyInternetserviceprovider(ISP)SharePointDecryptionEmailLoginPasswordResponsibilityAuthenticationOneDriveSecurityThreatMaliciousDataBreachSuspiciousWi-FiInternetEthernetIntrusiondetectionsystem(IDS)RouterVulnerabilityMicrosoft365Encryption2FA (Twofactorauthentication)ServerCertificateVerifyPersonalVirtualprivatenetwork(VPN)DMZInformationMaliciousCloudUsernameRiskClickIntrusionpreventionsystem(IPS)PhishingProtectedWebsiteVishingPIIFirewallCyberMalwareIdentifyInternetserviceprovider(ISP)SharePointDecryptionEmailLoginPasswordResponsibilityAuthenticationOneDriveSecurityThreatMaliciousDataBreachSuspiciousWi-FiInternetEthernetIntrusiondetectionsystem(IDS)RouterVulnerabilityMicrosoft365Encryption2FA (Twofactorauthentication)ServerCertificateVerifyPersonalVirtualprivatenetwork(VPN)DMZInformationMaliciousCloudUsernameRiskClickIntrusionpreventionsystem(IPS)PhishingProtectedWebsiteVishing

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. PII
  2. Firewall
  3. Cyber
  4. Malware
  5. Identify
  6. Internet service provider (ISP)
  7. SharePoint
  8. Decryption
  9. Email
  10. Login
  11. Password
  12. Responsibility
  13. Authentication
  14. OneDrive
  15. Security
  16. Threat
  17. Malicious
  18. Data Breach
  19. Suspicious
  20. Wi-Fi
  21. Internet
  22. Ethernet
  23. Intrusion detection system (IDS)
  24. Router
  25. Vulnerability
  26. Microsoft 365
  27. Encryption
  28. 2FA (Two factor authentication)
  29. Server
  30. Certificate
  31. Verify
  32. Personal
  33. Virtual private network (VPN)
  34. DMZ
  35. Information
  36. Malicious
  37. Cloud
  38. Username
  39. Risk
  40. Click
  41. Intrusion prevention system (IPS)
  42. Phishing
  43. Protected
  44. Website
  45. Vishing