ServerEmailSharePointPIIResponsibilityPhishingInternetserviceprovider(ISP)RiskMaliciousWi-FiThreat2FA (Twofactorauthentication)EthernetCyberIdentifyFirewallDataBreachVirtualprivatenetwork(VPN)MalwareUsernameWebsiteSecurityInternetIntrusiondetectionsystem(IDS)CertificateVishingIntrusionpreventionsystem(IPS)RouterMicrosoft365EncryptionVulnerabilityLoginAuthenticationOneDrivePersonalDecryptionPasswordSuspiciousDMZServerEmailSharePointPIIResponsibilityPhishingInternetserviceprovider(ISP)RiskMaliciousWi-FiThreat2FA (Twofactorauthentication)EthernetCyberIdentifyFirewallDataBreachVirtualprivatenetwork(VPN)MalwareUsernameWebsiteSecurityInternetIntrusiondetectionsystem(IDS)CertificateVishingIntrusionpreventionsystem(IPS)RouterMicrosoft365EncryptionVulnerabilityLoginAuthenticationOneDrivePersonalDecryptionPasswordSuspiciousDMZ

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Server
  2. Email
  3. SharePoint
  4. PII
  5. Responsibility
  6. Phishing
  7. Internet service provider (ISP)
  8. Risk
  9. Malicious
  10. Wi-Fi
  11. Threat
  12. 2FA (Two factor authentication)
  13. Ethernet
  14. Cyber
  15. Identify
  16. Firewall
  17. Data Breach
  18. Virtual private network (VPN)
  19. Malware
  20. Username
  21. Website
  22. Security
  23. Internet
  24. Intrusion detection system (IDS)
  25. Certificate
  26. Vishing
  27. Intrusion prevention system (IPS)
  28. Router
  29. Microsoft 365
  30. Encryption
  31. Vulnerability
  32. Login
  33. Authentication
  34. OneDrive
  35. Personal
  36. Decryption
  37. Password
  38. Suspicious
  39. DMZ