IntrusionDetectionSystem(IDS)PhishingTwo-FactorAuthentication(2FA)PatchManagementNetworkSecurityRansomwareVulnerabilityMalwareFree!IncidentResponsePasswordStrengthSocialEngineeringFirewallAccessControlDataBreachEncryptionIntrusionDetectionSystem(IDS)PhishingTwo-FactorAuthentication(2FA)PatchManagementNetworkSecurityRansomwareVulnerabilityMalwareFree!IncidentResponsePasswordStrengthSocialEngineeringFirewallAccessControlDataBreachEncryption

Cyber Awareness - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Intrusion Detection System (IDS)
  2. Phishing
  3. Two-Factor Authentication (2FA)
  4. Patch Management
  5. Network Security
  6. Ransomware
  7. Vulnerability
  8. Malware
  9. Free!
  10. Incident Response
  11. Password Strength
  12. Social Engineering
  13. Firewall
  14. Access Control
  15. Data Breach
  16. Encryption