PersonalInternetserviceprovider(ISP)ResponsibilityVishingServerLoginIdentifySuspiciousThreatPIICyberEthernetDMZCertificatePasswordDecryptionEmailMaliciousMalwareRouterSharePointRiskPhishingDataBreachWebsiteSecurity2FA (Twofactorauthentication)Virtualprivatenetwork(VPN)UsernameVulnerabilityIntrusionpreventionsystem(IPS)OneDriveIntrusiondetectionsystem(IDS)InternetAuthenticationWi-FiMicrosoft365FirewallEncryptionPersonalInternetserviceprovider(ISP)ResponsibilityVishingServerLoginIdentifySuspiciousThreatPIICyberEthernetDMZCertificatePasswordDecryptionEmailMaliciousMalwareRouterSharePointRiskPhishingDataBreachWebsiteSecurity2FA (Twofactorauthentication)Virtualprivatenetwork(VPN)UsernameVulnerabilityIntrusionpreventionsystem(IPS)OneDriveIntrusiondetectionsystem(IDS)InternetAuthenticationWi-FiMicrosoft365FirewallEncryption

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Personal
  2. Internet service provider (ISP)
  3. Responsibility
  4. Vishing
  5. Server
  6. Login
  7. Identify
  8. Suspicious
  9. Threat
  10. PII
  11. Cyber
  12. Ethernet
  13. DMZ
  14. Certificate
  15. Password
  16. Decryption
  17. Email
  18. Malicious
  19. Malware
  20. Router
  21. SharePoint
  22. Risk
  23. Phishing
  24. Data Breach
  25. Website
  26. Security
  27. 2FA (Two factor authentication)
  28. Virtual private network (VPN)
  29. Username
  30. Vulnerability
  31. Intrusion prevention system (IPS)
  32. OneDrive
  33. Intrusion detection system (IDS)
  34. Internet
  35. Authentication
  36. Wi-Fi
  37. Microsoft 365
  38. Firewall
  39. Encryption