DataBreachComputerSoftwareHardwareInternetFirewallVulnerabilityRansomwareTwo-FactorAuthentication(2FA)20%EncryptionPhishingMalwareSecretandSecureDataIntegrityHackerThreatITInfrastructureVirtualPrivateNetwork(VPN)USBWindows7PasswordCybersecurityAntivirusDataBreachComputerSoftwareHardwareInternetFirewallVulnerabilityRansomwareTwo-FactorAuthentication(2FA)20%EncryptionPhishingMalwareSecretandSecureDataIntegrityHackerThreatITInfrastructureVirtualPrivateNetwork(VPN)USBWindows7PasswordCybersecurityAntivirus

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Data Breach
  2. Computer
  3. Software
  4. Hardware
  5. Internet
  6. Firewall
  7. Vulnerability
  8. Ransomware
  9. Two-Factor Authentication (2FA)
  10. 20%
  11. Encryption
  12. Phishing
  13. Malware
  14. Secret and Secure
  15. Data Integrity
  16. Hacker
  17. Threat
  18. IT Infrastructure
  19. Virtual Private Network (VPN)
  20. USB
  21. Windows 7
  22. Password
  23. Cybersecurity
  24. Antivirus