CertificateResponsibilityPIIPhishingEncryptionInternetserviceprovider(ISP)FirewallSecurityDataBreachMaliciousIntrusionpreventionsystem(IPS)DMZDecryptionAuthenticationPersonalMicrosoft365SharePointUsernameVulnerabilityLoginRouterEthernetWi-FiMalware2FA (Twofactorauthentication)RiskSuspiciousEmailOneDriveIdentifyPasswordThreatCyberWebsiteServerVirtualprivatenetwork(VPN)InternetVishingIntrusiondetectionsystem(IDS)CertificateResponsibilityPIIPhishingEncryptionInternetserviceprovider(ISP)FirewallSecurityDataBreachMaliciousIntrusionpreventionsystem(IPS)DMZDecryptionAuthenticationPersonalMicrosoft365SharePointUsernameVulnerabilityLoginRouterEthernetWi-FiMalware2FA (Twofactorauthentication)RiskSuspiciousEmailOneDriveIdentifyPasswordThreatCyberWebsiteServerVirtualprivatenetwork(VPN)InternetVishingIntrusiondetectionsystem(IDS)

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Certificate
  2. Responsibility
  3. PII
  4. Phishing
  5. Encryption
  6. Internet service provider (ISP)
  7. Firewall
  8. Security
  9. Data Breach
  10. Malicious
  11. Intrusion prevention system (IPS)
  12. DMZ
  13. Decryption
  14. Authentication
  15. Personal
  16. Microsoft 365
  17. SharePoint
  18. Username
  19. Vulnerability
  20. Login
  21. Router
  22. Ethernet
  23. Wi-Fi
  24. Malware
  25. 2FA (Two factor authentication)
  26. Risk
  27. Suspicious
  28. Email
  29. OneDrive
  30. Identify
  31. Password
  32. Threat
  33. Cyber
  34. Website
  35. Server
  36. Virtual private network (VPN)
  37. Internet
  38. Vishing
  39. Intrusion detection system (IDS)