MaliciousUsernameSuspiciousPIIMalwareEthernetCertificateIntrusionpreventionsystem(IPS)DataBreachVirtualprivatenetwork(VPN)LoginDMZSharePointEncryptionIntrusiondetectionsystem(IDS)Internetserviceprovider(ISP)PersonalDecryptionVishingPasswordCyberRouter2FA (Twofactorauthentication)WebsiteVulnerabilityIdentifyMicrosoft365AuthenticationFirewallInternetWi-FiEmailOneDrivePhishingSecurityResponsibilityServerRiskThreatMaliciousUsernameSuspiciousPIIMalwareEthernetCertificateIntrusionpreventionsystem(IPS)DataBreachVirtualprivatenetwork(VPN)LoginDMZSharePointEncryptionIntrusiondetectionsystem(IDS)Internetserviceprovider(ISP)PersonalDecryptionVishingPasswordCyberRouter2FA (Twofactorauthentication)WebsiteVulnerabilityIdentifyMicrosoft365AuthenticationFirewallInternetWi-FiEmailOneDrivePhishingSecurityResponsibilityServerRiskThreat

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Malicious
  2. Username
  3. Suspicious
  4. PII
  5. Malware
  6. Ethernet
  7. Certificate
  8. Intrusion prevention system (IPS)
  9. Data Breach
  10. Virtual private network (VPN)
  11. Login
  12. DMZ
  13. SharePoint
  14. Encryption
  15. Intrusion detection system (IDS)
  16. Internet service provider (ISP)
  17. Personal
  18. Decryption
  19. Vishing
  20. Password
  21. Cyber
  22. Router
  23. 2FA (Two factor authentication)
  24. Website
  25. Vulnerability
  26. Identify
  27. Microsoft 365
  28. Authentication
  29. Firewall
  30. Internet
  31. Wi-Fi
  32. Email
  33. OneDrive
  34. Phishing
  35. Security
  36. Responsibility
  37. Server
  38. Risk
  39. Threat