PasswordBotnetStakeholderMalwareFirewallBYODOSINTVulnerabilityShadowITVishingOSINTSpywareSocialengineeringSpamAuthenticationRiskVPNBruteforceHackerKeyloggerSegmentationCIATriadCiphertextNon-repudiationSmishingCloudAISteganographyDarkwebHactivistWiFiZero-dayIOTDevicesDatabreachFrameworkPatchBYODPasswordBotnetStakeholderMalwareFirewallBYODOSINTVulnerabilityShadowITVishingOSINTSpywareSocialengineeringSpamAuthenticationRiskVPNBruteforceHackerKeyloggerSegmentationCIATriadCiphertextNon-repudiationSmishingCloudAISteganographyDarkwebHactivistWiFiZero-dayIOTDevicesDatabreachFrameworkPatchBYOD

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Password
  2. Botnet
  3. Stakeholder
  4. Malware
  5. Firewall
  6. BYOD
  7. OSINT
  8. Vulnerability
  9. Shadow IT
  10. Vishing
  11. OSINT
  12. Spyware
  13. Social engineering
  14. Spam
  15. Authentication
  16. Risk
  17. VPN
  18. Brute force
  19. Hacker
  20. Keylogger
  21. Segmentation
  22. CIA Triad
  23. Ciphertext
  24. Non-repudiation
  25. Smishing
  26. Cloud
  27. AI
  28. Steganography
  29. Dark web
  30. Hactivist
  31. WiFi
  32. Zero-day
  33. IOT Devices
  34. Data breach
  35. Framework
  36. Patch
  37. BYOD