InternetofThingsSwitchInformationSecuritySpywareCriticalInfrastructureSocialEngineeringChecksumRansomwareShoulderSurfingApplicationBIOSScamConfidentialityMalwareNetiquettePersonallyIdentifiableInformationBotAccountSpearPhishingCyberEthicsTrojanHorseAuthenticationServerCybersecurityAuthorizationFirewallClickbaitLogicBombZombieSoftwareIntegrityPhishingRouterOperatingSystemVirtualMachineDumpsterDivingAntivirusBackdoorMobileDeviceKeyloggerWormVirusCybercrimeScarewareCyberHygieneAvailabilityInternetofThingsSwitchInformationSecuritySpywareCriticalInfrastructureSocialEngineeringChecksumRansomwareShoulderSurfingApplicationBIOSScamConfidentialityMalwareNetiquettePersonallyIdentifiableInformationBotAccountSpearPhishingCyberEthicsTrojanHorseAuthenticationServerCybersecurityAuthorizationFirewallClickbaitLogicBombZombieSoftwareIntegrityPhishingRouterOperatingSystemVirtualMachineDumpsterDivingAntivirusBackdoorMobileDeviceKeyloggerWormVirusCybercrimeScarewareCyberHygieneAvailability

Day 1 Review - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Internet of Things
  2. Switch
  3. Information Security
  4. Spyware
  5. Critical Infrastructure
  6. Social Engineering
  7. Checksum
  8. Ransomware
  9. Shoulder Surfing
  10. Application
  11. BIOS
  12. Scam
  13. Confidentiality
  14. Malware
  15. Netiquette
  16. Personally Identifiable Information
  17. Bot Account
  18. Spear Phishing
  19. Cyber Ethics
  20. Trojan Horse
  21. Authentication
  22. Server
  23. Cybersecurity
  24. Authorization
  25. Firewall
  26. Clickbait
  27. Logic Bomb
  28. Zombie Software
  29. Integrity
  30. Phishing
  31. Router
  32. Operating System
  33. Virtual Machine
  34. Dumpster Diving
  35. Antivirus
  36. Backdoor
  37. Mobile Device
  38. Keylogger
  39. Worm
  40. Virus
  41. Cybercrime
  42. Scareware
  43. Cyber Hygiene
  44. Availability