VulnerabilitiesIntrusionPatchingPreventativeMoneyRecordTrainingDamage Outdated BitcoinAwarenessMaliciousShowcaseRetrievabilityEducationDataMaintenanceUnauthorizedBackgroundCryptocurrencyCreditTechnologyFrameworkSETAVulnerabilitiesIntrusionPatchingPreventativeMoneyRecordTrainingDamage Outdated BitcoinAwarenessMaliciousShowcaseRetrievabilityEducationDataMaintenanceUnauthorizedBackgroundCryptocurrencyCreditTechnologyFrameworkSETA

Cyber Security BIngo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Vulnerabilities
  2. Intrusion
  3. Patching
  4. Preventative
  5. Money
  6. Record
  7. Training
  8. Damage
  9. Outdated
  10. Bitcoin
  11. Awareness
  12. Malicious
  13. Showcase
  14. Retrievability
  15. Education
  16. Data
  17. Maintenance
  18. Unauthorized
  19. Background
  20. Cryptocurrency
  21. Credit
  22. Technology
  23. Framework
  24. SETA