VishingAuthenticationSecurityOneDriveMalwareCyberWi-FiPasswordLoginIdentifyEthernetWebsiteDataBreachCertificateMicrosoft365Intrusionpreventionsystem(IPS)EncryptionEmailVulnerabilityServerIntrusiondetectionsystem(IDS)Internetserviceprovider(ISP)RiskInternetDecryptionPersonalSuspiciousMaliciousRouterResponsibilityUsernameFirewallSharePointPIIVirtualprivatenetwork(VPN)2FA (Twofactorauthentication)ThreatPhishingDMZVishingAuthenticationSecurityOneDriveMalwareCyberWi-FiPasswordLoginIdentifyEthernetWebsiteDataBreachCertificateMicrosoft365Intrusionpreventionsystem(IPS)EncryptionEmailVulnerabilityServerIntrusiondetectionsystem(IDS)Internetserviceprovider(ISP)RiskInternetDecryptionPersonalSuspiciousMaliciousRouterResponsibilityUsernameFirewallSharePointPIIVirtualprivatenetwork(VPN)2FA (Twofactorauthentication)ThreatPhishingDMZ

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Vishing
  2. Authentication
  3. Security
  4. OneDrive
  5. Malware
  6. Cyber
  7. Wi-Fi
  8. Password
  9. Login
  10. Identify
  11. Ethernet
  12. Website
  13. Data Breach
  14. Certificate
  15. Microsoft 365
  16. Intrusion prevention system (IPS)
  17. Encryption
  18. Email
  19. Vulnerability
  20. Server
  21. Intrusion detection system (IDS)
  22. Internet service provider (ISP)
  23. Risk
  24. Internet
  25. Decryption
  26. Personal
  27. Suspicious
  28. Malicious
  29. Router
  30. Responsibility
  31. Username
  32. Firewall
  33. SharePoint
  34. PII
  35. Virtual private network (VPN)
  36. 2FA (Two factor authentication)
  37. Threat
  38. Phishing
  39. DMZ