Multi-factorauthenticationComputerVirusSpoofingPrivacyFirewallVulnerabilityPasswordCyberSerucityPhishingSecurityThreatDataProtectionComputerWorkstationScamsCyberHardware"Patch"esO'HoulihanDataDestructionServiceDeskVPNHITECHLockyourscreenSoftwareNISTBadgeCloudFraudEncryptBreachPatrickCordovaFree!InformationTechnologyProtectSSOInternetWormRiskassessmentTrojanhorseMulti-factorauthenticationComputerVirusSpoofingPrivacyFirewallVulnerabilityPasswordCyberSerucityPhishingSecurityThreatDataProtectionComputerWorkstationScamsCyberHardware"Patch"esO'HoulihanDataDestructionServiceDeskVPNHITECHLockyourscreenSoftwareNISTBadgeCloudFraudEncryptBreachPatrickCordovaFree!InformationTechnologyProtectSSOInternetWormRiskassessmentTrojanhorse

Cyber Security Day - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. Multi-factor authentication
  2. Computer Virus
  3. Spoofing
  4. Privacy
  5. Firewall
  6. Vulnerability
  7. Password
  8. Cyber Serucity
  9. Phishing
  10. Security Threat
  11. Data Protection
  12. Computer
  13. Workstation
  14. Scams
  15. Cyber
  16. Hardware
  17. "Patch"es O'Houlihan
  18. Data Destruction
  19. Service Desk
  20. VPN
  21. HITECH
  22. Lock your screen
  23. Software
  24. NIST
  25. Badge
  26. Cloud
  27. Fraud
  28. Encrypt
  29. Breach
  30. Patrick Cordova
  31. Free!
  32. Information Technology
  33. Protect
  34. SSO
  35. Internet
  36. Worm
  37. Risk assessment
  38. Trojan horse