IdentifySharePointWebsiteMicrosoft365Internetserviceprovider(ISP)PIIWi-FiIntrusionpreventionsystem(IPS)MalwarePersonalAuthenticationLoginOneDrivePhishingPassword2FA (Twofactorauthentication)Intrusiondetectionsystem(IDS)VishingResponsibilityDecryptionServerUsernameRouterVulnerabilitySecurityCertificateCyberSuspiciousFirewallThreatEncryptionEthernetRiskVirtualprivatenetwork(VPN)DataBreachDMZEmailMaliciousInternetIdentifySharePointWebsiteMicrosoft365Internetserviceprovider(ISP)PIIWi-FiIntrusionpreventionsystem(IPS)MalwarePersonalAuthenticationLoginOneDrivePhishingPassword2FA (Twofactorauthentication)Intrusiondetectionsystem(IDS)VishingResponsibilityDecryptionServerUsernameRouterVulnerabilitySecurityCertificateCyberSuspiciousFirewallThreatEncryptionEthernetRiskVirtualprivatenetwork(VPN)DataBreachDMZEmailMaliciousInternet

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Identify
  2. SharePoint
  3. Website
  4. Microsoft 365
  5. Internet service provider (ISP)
  6. PII
  7. Wi-Fi
  8. Intrusion prevention system (IPS)
  9. Malware
  10. Personal
  11. Authentication
  12. Login
  13. OneDrive
  14. Phishing
  15. Password
  16. 2FA (Two factor authentication)
  17. Intrusion detection system (IDS)
  18. Vishing
  19. Responsibility
  20. Decryption
  21. Server
  22. Username
  23. Router
  24. Vulnerability
  25. Security
  26. Certificate
  27. Cyber
  28. Suspicious
  29. Firewall
  30. Threat
  31. Encryption
  32. Ethernet
  33. Risk
  34. Virtual private network (VPN)
  35. Data Breach
  36. DMZ
  37. Email
  38. Malicious
  39. Internet