InternetWormPrivacyComputerProtect"Patch"esO'HoulihanLockyourscreenFraudFirewallVPNDataProtectionPasswordBadgeSSOSpoofingMulti-factorauthenticationComputerVirusDataDestructionCloudServiceDeskTrojanhorseRiskassessmentScamsHITECHCyberSerucityVulnerabilityCyberSecurityThreatPhishingBreachPatrickCordovaHardwareFree!EncryptSoftwareInformationTechnologyNISTWorkstationInternetWormPrivacyComputerProtect"Patch"esO'HoulihanLockyourscreenFraudFirewallVPNDataProtectionPasswordBadgeSSOSpoofingMulti-factorauthenticationComputerVirusDataDestructionCloudServiceDeskTrojanhorseRiskassessmentScamsHITECHCyberSerucityVulnerabilityCyberSecurityThreatPhishingBreachPatrickCordovaHardwareFree!EncryptSoftwareInformationTechnologyNISTWorkstation

Cyber Security Day - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. Internet
  2. Worm
  3. Privacy
  4. Computer
  5. Protect
  6. "Patch"es O'Houlihan
  7. Lock your screen
  8. Fraud
  9. Firewall
  10. VPN
  11. Data Protection
  12. Password
  13. Badge
  14. SSO
  15. Spoofing
  16. Multi-factor authentication
  17. Computer Virus
  18. Data Destruction
  19. Cloud
  20. Service Desk
  21. Trojan horse
  22. Risk assessment
  23. Scams
  24. HITECH
  25. Cyber Serucity
  26. Vulnerability
  27. Cyber
  28. Security Threat
  29. Phishing
  30. Breach
  31. Patrick Cordova
  32. Hardware
  33. Free!
  34. Encrypt
  35. Software
  36. Information Technology
  37. NIST
  38. Workstation