FirewallMaliciousVirtualprivatenetwork(VPN)EmailPasswordResponsibilityPIIEthernetIdentifyInternetServerRiskPersonalPhishingUsernameCertificateMalwareSecurityAuthenticationThreatLoginSharePoint2FA (Twofactorauthentication)CyberDMZVishingWebsiteOneDriveInternetserviceprovider(ISP)SuspiciousWi-FiRouterDecryptionDataBreachMicrosoft365VulnerabilityIntrusionpreventionsystem(IPS)Intrusiondetectionsystem(IDS)EncryptionFirewallMaliciousVirtualprivatenetwork(VPN)EmailPasswordResponsibilityPIIEthernetIdentifyInternetServerRiskPersonalPhishingUsernameCertificateMalwareSecurityAuthenticationThreatLoginSharePoint2FA (Twofactorauthentication)CyberDMZVishingWebsiteOneDriveInternetserviceprovider(ISP)SuspiciousWi-FiRouterDecryptionDataBreachMicrosoft365VulnerabilityIntrusionpreventionsystem(IPS)Intrusiondetectionsystem(IDS)Encryption

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Firewall
  2. Malicious
  3. Virtual private network (VPN)
  4. Email
  5. Password
  6. Responsibility
  7. PII
  8. Ethernet
  9. Identify
  10. Internet
  11. Server
  12. Risk
  13. Personal
  14. Phishing
  15. Username
  16. Certificate
  17. Malware
  18. Security
  19. Authentication
  20. Threat
  21. Login
  22. SharePoint
  23. 2FA (Two factor authentication)
  24. Cyber
  25. DMZ
  26. Vishing
  27. Website
  28. OneDrive
  29. Internet service provider (ISP)
  30. Suspicious
  31. Wi-Fi
  32. Router
  33. Decryption
  34. Data Breach
  35. Microsoft 365
  36. Vulnerability
  37. Intrusion prevention system (IPS)
  38. Intrusion detection system (IDS)
  39. Encryption