SharePointInternetPasswordLoginWebsiteVishingPhishingCyberWi-FiDMZMalwareResponsibilityIntrusiondetectionsystem(IDS)OneDriveAuthenticationEncryption2FA (Twofactorauthentication)RiskIdentifyEthernetDecryptionEmailMaliciousSecurityPersonalDataBreachIntrusionpreventionsystem(IPS)CertificateServerSuspiciousThreatUsernameVulnerabilityPIIInternetserviceprovider(ISP)FirewallRouterVirtualprivatenetwork(VPN)Microsoft365SharePointInternetPasswordLoginWebsiteVishingPhishingCyberWi-FiDMZMalwareResponsibilityIntrusiondetectionsystem(IDS)OneDriveAuthenticationEncryption2FA (Twofactorauthentication)RiskIdentifyEthernetDecryptionEmailMaliciousSecurityPersonalDataBreachIntrusionpreventionsystem(IPS)CertificateServerSuspiciousThreatUsernameVulnerabilityPIIInternetserviceprovider(ISP)FirewallRouterVirtualprivatenetwork(VPN)Microsoft365

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. SharePoint
  2. Internet
  3. Password
  4. Login
  5. Website
  6. Vishing
  7. Phishing
  8. Cyber
  9. Wi-Fi
  10. DMZ
  11. Malware
  12. Responsibility
  13. Intrusion detection system (IDS)
  14. OneDrive
  15. Authentication
  16. Encryption
  17. 2FA (Two factor authentication)
  18. Risk
  19. Identify
  20. Ethernet
  21. Decryption
  22. Email
  23. Malicious
  24. Security
  25. Personal
  26. Data Breach
  27. Intrusion prevention system (IPS)
  28. Certificate
  29. Server
  30. Suspicious
  31. Threat
  32. Username
  33. Vulnerability
  34. PII
  35. Internet service provider (ISP)
  36. Firewall
  37. Router
  38. Virtual private network (VPN)
  39. Microsoft 365