ZombieSoftwareCriticalInfrastructureRansomwareChecksumCyberEthicsMobileDeviceOperatingSystemFirewallPhishingBotAccountApplicationWormMalwareCybercrimeScarewareBIOSAntivirusConfidentialityTrojanHorseVirusAuthorizationSpearPhishingInternetofThingsClickbaitKeyloggerCyberHygieneAuthenticationDumpsterDivingScamCybersecuritySpywareLogicBombNetiquetteSocialEngineeringInformationSecurityPersonallyIdentifiableInformationBackdoorRouterServerSwitchAvailabilityIntegrityVirtualMachineShoulderSurfingZombieSoftwareCriticalInfrastructureRansomwareChecksumCyberEthicsMobileDeviceOperatingSystemFirewallPhishingBotAccountApplicationWormMalwareCybercrimeScarewareBIOSAntivirusConfidentialityTrojanHorseVirusAuthorizationSpearPhishingInternetofThingsClickbaitKeyloggerCyberHygieneAuthenticationDumpsterDivingScamCybersecuritySpywareLogicBombNetiquetteSocialEngineeringInformationSecurityPersonallyIdentifiableInformationBackdoorRouterServerSwitchAvailabilityIntegrityVirtualMachineShoulderSurfing

Day 1 Review - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Zombie Software
  2. Critical Infrastructure
  3. Ransomware
  4. Checksum
  5. Cyber Ethics
  6. Mobile Device
  7. Operating System
  8. Firewall
  9. Phishing
  10. Bot Account
  11. Application
  12. Worm
  13. Malware
  14. Cybercrime
  15. Scareware
  16. BIOS
  17. Antivirus
  18. Confidentiality
  19. Trojan Horse
  20. Virus
  21. Authorization
  22. Spear Phishing
  23. Internet of Things
  24. Clickbait
  25. Keylogger
  26. Cyber Hygiene
  27. Authentication
  28. Dumpster Diving
  29. Scam
  30. Cybersecurity
  31. Spyware
  32. Logic Bomb
  33. Netiquette
  34. Social Engineering
  35. Information Security
  36. Personally Identifiable Information
  37. Backdoor
  38. Router
  39. Server
  40. Switch
  41. Availability
  42. Integrity
  43. Virtual Machine
  44. Shoulder Surfing