AuthenticationBruteforceZero-dayVishingDatabreachFrameworkIOTDevicesSpywareMalwareVulnerabilityShadowITSocialengineeringRiskWiFiStakeholderSpamCiphertextSteganographyOSINTSmishingBYODAISegmentationCloudOSINTHactivistDarkwebCIATriadVPNPasswordKeyloggerBotnetNon-repudiationBYODHackerPatchFirewallAuthenticationBruteforceZero-dayVishingDatabreachFrameworkIOTDevicesSpywareMalwareVulnerabilityShadowITSocialengineeringRiskWiFiStakeholderSpamCiphertextSteganographyOSINTSmishingBYODAISegmentationCloudOSINTHactivistDarkwebCIATriadVPNPasswordKeyloggerBotnetNon-repudiationBYODHackerPatchFirewall

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Authentication
  2. Brute force
  3. Zero-day
  4. Vishing
  5. Data breach
  6. Framework
  7. IOT Devices
  8. Spyware
  9. Malware
  10. Vulnerability
  11. Shadow IT
  12. Social engineering
  13. Risk
  14. WiFi
  15. Stakeholder
  16. Spam
  17. Ciphertext
  18. Steganography
  19. OSINT
  20. Smishing
  21. BYOD
  22. AI
  23. Segmentation
  24. Cloud
  25. OSINT
  26. Hactivist
  27. Dark web
  28. CIA Triad
  29. VPN
  30. Password
  31. Keylogger
  32. Botnet
  33. Non-repudiation
  34. BYOD
  35. Hacker
  36. Patch
  37. Firewall