IOTDevicesBruteforcePatchCIATriadWiFiSmishingBotnetStakeholderAuthenticationHackerMalwareRiskDatabreachSteganographyDarkwebKeyloggerZero-dayVPNSegmentationSpamAIOSINTFirewallBYODShadowITCiphertextHactivistVishingVulnerabilityOSINTSpywareBYODPasswordSocialengineeringFrameworkCloudNon-repudiationIOTDevicesBruteforcePatchCIATriadWiFiSmishingBotnetStakeholderAuthenticationHackerMalwareRiskDatabreachSteganographyDarkwebKeyloggerZero-dayVPNSegmentationSpamAIOSINTFirewallBYODShadowITCiphertextHactivistVishingVulnerabilityOSINTSpywareBYODPasswordSocialengineeringFrameworkCloudNon-repudiation

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. IOT Devices
  2. Brute force
  3. Patch
  4. CIA Triad
  5. WiFi
  6. Smishing
  7. Botnet
  8. Stakeholder
  9. Authentication
  10. Hacker
  11. Malware
  12. Risk
  13. Data breach
  14. Steganography
  15. Dark web
  16. Keylogger
  17. Zero-day
  18. VPN
  19. Segmentation
  20. Spam
  21. AI
  22. OSINT
  23. Firewall
  24. BYOD
  25. Shadow IT
  26. Ciphertext
  27. Hactivist
  28. Vishing
  29. Vulnerability
  30. OSINT
  31. Spyware
  32. BYOD
  33. Password
  34. Social engineering
  35. Framework
  36. Cloud
  37. Non-repudiation