PhishingVulnerabilityVishingInternetserviceprovider(ISP)CyberPersonalAuthentication2FA (Twofactorauthentication)InternetRiskDMZThreatUsernameMalwareFirewallMaliciousRouterMicrosoft365OneDriveEthernetEncryptionSuspiciousIntrusionpreventionsystem(IPS)SharePointDataBreachServerEmailWebsiteIdentifyVirtualprivatenetwork(VPN)LoginWi-FiDecryptionIntrusiondetectionsystem(IDS)SecurityResponsibilityPasswordCertificatePIIPhishingVulnerabilityVishingInternetserviceprovider(ISP)CyberPersonalAuthentication2FA (Twofactorauthentication)InternetRiskDMZThreatUsernameMalwareFirewallMaliciousRouterMicrosoft365OneDriveEthernetEncryptionSuspiciousIntrusionpreventionsystem(IPS)SharePointDataBreachServerEmailWebsiteIdentifyVirtualprivatenetwork(VPN)LoginWi-FiDecryptionIntrusiondetectionsystem(IDS)SecurityResponsibilityPasswordCertificatePII

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Phishing
  2. Vulnerability
  3. Vishing
  4. Internet service provider (ISP)
  5. Cyber
  6. Personal
  7. Authentication
  8. 2FA (Two factor authentication)
  9. Internet
  10. Risk
  11. DMZ
  12. Threat
  13. Username
  14. Malware
  15. Firewall
  16. Malicious
  17. Router
  18. Microsoft 365
  19. OneDrive
  20. Ethernet
  21. Encryption
  22. Suspicious
  23. Intrusion prevention system (IPS)
  24. SharePoint
  25. Data Breach
  26. Server
  27. Email
  28. Website
  29. Identify
  30. Virtual private network (VPN)
  31. Login
  32. Wi-Fi
  33. Decryption
  34. Intrusion detection system (IDS)
  35. Security
  36. Responsibility
  37. Password
  38. Certificate
  39. PII