SharePointEncryptionRiskWebsitePhishingLoginVishingDecryptionOneDriveMicrosoft365PasswordFirewallIntrusiondetectionsystem(IDS)EmailPIIThreat2FA (Twofactorauthentication)PersonalSecurityWi-FiInternetserviceprovider(ISP)SuspiciousRouterVulnerabilityEthernetVirtualprivatenetwork(VPN)ServerMalwareDataBreachCyberInternetAuthenticationIntrusionpreventionsystem(IPS)MaliciousIdentifyCertificateUsernameDMZResponsibilitySharePointEncryptionRiskWebsitePhishingLoginVishingDecryptionOneDriveMicrosoft365PasswordFirewallIntrusiondetectionsystem(IDS)EmailPIIThreat2FA (Twofactorauthentication)PersonalSecurityWi-FiInternetserviceprovider(ISP)SuspiciousRouterVulnerabilityEthernetVirtualprivatenetwork(VPN)ServerMalwareDataBreachCyberInternetAuthenticationIntrusionpreventionsystem(IPS)MaliciousIdentifyCertificateUsernameDMZResponsibility

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. SharePoint
  2. Encryption
  3. Risk
  4. Website
  5. Phishing
  6. Login
  7. Vishing
  8. Decryption
  9. OneDrive
  10. Microsoft 365
  11. Password
  12. Firewall
  13. Intrusion detection system (IDS)
  14. Email
  15. PII
  16. Threat
  17. 2FA (Two factor authentication)
  18. Personal
  19. Security
  20. Wi-Fi
  21. Internet service provider (ISP)
  22. Suspicious
  23. Router
  24. Vulnerability
  25. Ethernet
  26. Virtual private network (VPN)
  27. Server
  28. Malware
  29. Data Breach
  30. Cyber
  31. Internet
  32. Authentication
  33. Intrusion prevention system (IPS)
  34. Malicious
  35. Identify
  36. Certificate
  37. Username
  38. DMZ
  39. Responsibility