VishingPasswordIdentifyIntrusionpreventionsystem(IPS)Virtualprivatenetwork(VPN)Wi-FiDataBreachSecurityEncryptionSharePointLoginPersonalPhishingDMZServerDecryptionResponsibilityMalwareOneDriveEthernetSuspiciousEmailThreatInternetMicrosoft365PIIRiskFirewallCertificateMaliciousCyberUsernameIntrusiondetectionsystem(IDS)Router2FA (Twofactorauthentication)Internetserviceprovider(ISP)AuthenticationWebsiteVulnerabilityVishingPasswordIdentifyIntrusionpreventionsystem(IPS)Virtualprivatenetwork(VPN)Wi-FiDataBreachSecurityEncryptionSharePointLoginPersonalPhishingDMZServerDecryptionResponsibilityMalwareOneDriveEthernetSuspiciousEmailThreatInternetMicrosoft365PIIRiskFirewallCertificateMaliciousCyberUsernameIntrusiondetectionsystem(IDS)Router2FA (Twofactorauthentication)Internetserviceprovider(ISP)AuthenticationWebsiteVulnerability

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Vishing
  2. Password
  3. Identify
  4. Intrusion prevention system (IPS)
  5. Virtual private network (VPN)
  6. Wi-Fi
  7. Data Breach
  8. Security
  9. Encryption
  10. SharePoint
  11. Login
  12. Personal
  13. Phishing
  14. DMZ
  15. Server
  16. Decryption
  17. Responsibility
  18. Malware
  19. OneDrive
  20. Ethernet
  21. Suspicious
  22. Email
  23. Threat
  24. Internet
  25. Microsoft 365
  26. PII
  27. Risk
  28. Firewall
  29. Certificate
  30. Malicious
  31. Cyber
  32. Username
  33. Intrusion detection system (IDS)
  34. Router
  35. 2FA (Two factor authentication)
  36. Internet service provider (ISP)
  37. Authentication
  38. Website
  39. Vulnerability