AuthenticationBYODBotnetStakeholderDarkwebVulnerabilityOSINTCloudCiphertextSocialengineeringNon-repudiationShadowITFrameworkWiFiBYODHactivistSpywareVPNZero-dayRiskKeyloggerPatchCIATriadHackerVishingSteganographySmishingMalwareBruteforceAISpamSegmentationFirewallOSINTDatabreachIOTDevicesPasswordAuthenticationBYODBotnetStakeholderDarkwebVulnerabilityOSINTCloudCiphertextSocialengineeringNon-repudiationShadowITFrameworkWiFiBYODHactivistSpywareVPNZero-dayRiskKeyloggerPatchCIATriadHackerVishingSteganographySmishingMalwareBruteforceAISpamSegmentationFirewallOSINTDatabreachIOTDevicesPassword

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Authentication
  2. BYOD
  3. Botnet
  4. Stakeholder
  5. Dark web
  6. Vulnerability
  7. OSINT
  8. Cloud
  9. Ciphertext
  10. Social engineering
  11. Non-repudiation
  12. Shadow IT
  13. Framework
  14. WiFi
  15. BYOD
  16. Hactivist
  17. Spyware
  18. VPN
  19. Zero-day
  20. Risk
  21. Keylogger
  22. Patch
  23. CIA Triad
  24. Hacker
  25. Vishing
  26. Steganography
  27. Smishing
  28. Malware
  29. Brute force
  30. AI
  31. Spam
  32. Segmentation
  33. Firewall
  34. OSINT
  35. Data breach
  36. IOT Devices
  37. Password