ThinkingLike anAdversarySign ofConfidentialityciphersKeep itSimpleBeStrong!scamSign ofKeep itSimpleAvailabilityPythonfirewallhackerempathyBeKind!complexityBeAlert!cyberbullyingJavaScriptphishingdecodingSign ofThinkingLike anAdversaryIntegrityiRobotSign ofDefensein DepthBeBrave!Confidentialitymicro:bitstwo-factorauthenticationSign ofIntegrityDefensein DepthcorruptionencryptionSign ofAvailabilityThinkingLike anAdversarySign ofConfidentialityciphersKeep itSimpleBeStrong!scamSign ofKeep itSimpleAvailabilityPythonfirewallhackerempathyBeKind!complexityBeAlert!cyberbullyingJavaScriptphishingdecodingSign ofThinkingLike anAdversaryIntegrityiRobotSign ofDefensein DepthBeBrave!Confidentialitymicro:bitstwo-factorauthenticationSign ofIntegrityDefensein DepthcorruptionencryptionSign ofAvailability

GenCyber Instructors 2023 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Thinking Like an Adversary
  2. Sign of Confidentiality
  3. ciphers
  4. Keep it Simple
  5. Be Strong!
  6. scam
  7. Sign of Keep it Simple
  8. Availability
  9. Python
  10. firewall
  11. hacker
  12. empathy
  13. Be Kind!
  14. complexity
  15. Be Alert!
  16. cyberbullying
  17. JavaScript
  18. phishing
  19. decoding
  20. Sign of Thinking Like an Adversary
  21. Integrity
  22. iRobot
  23. Sign of Defense in Depth
  24. Be Brave!
  25. Confidentiality
  26. micro:bits
  27. two-factor authentication
  28. Sign of Integrity
  29. Defense in Depth
  30. corruption
  31. encryption
  32. Sign of Availability