VulnerabilitySmishingSteganographyHactivistMalwareKeyloggerSpywareBotnetZero-daySocialengineeringCloudOSINTNon-repudiationDatabreachBruteforceShadowITCiphertextHackerPasswordRiskIOTDevicesFrameworkSpamVPNBYODFirewallOSINTStakeholderAIBYODAuthenticationCIATriadPatchWiFiVishingDarkwebSegmentationVulnerabilitySmishingSteganographyHactivistMalwareKeyloggerSpywareBotnetZero-daySocialengineeringCloudOSINTNon-repudiationDatabreachBruteforceShadowITCiphertextHackerPasswordRiskIOTDevicesFrameworkSpamVPNBYODFirewallOSINTStakeholderAIBYODAuthenticationCIATriadPatchWiFiVishingDarkwebSegmentation

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Vulnerability
  2. Smishing
  3. Steganography
  4. Hactivist
  5. Malware
  6. Keylogger
  7. Spyware
  8. Botnet
  9. Zero-day
  10. Social engineering
  11. Cloud
  12. OSINT
  13. Non-repudiation
  14. Data breach
  15. Brute force
  16. Shadow IT
  17. Ciphertext
  18. Hacker
  19. Password
  20. Risk
  21. IOT Devices
  22. Framework
  23. Spam
  24. VPN
  25. BYOD
  26. Firewall
  27. OSINT
  28. Stakeholder
  29. AI
  30. BYOD
  31. Authentication
  32. CIA Triad
  33. Patch
  34. WiFi
  35. Vishing
  36. Dark web
  37. Segmentation