DarkwebDatabreachSpywareFirewallOSINTSocialengineeringPatchCIATriadZero-daySpamHackerCiphertextBruteforceFrameworkShadowITSteganographyPasswordAIAuthenticationMalwareRiskCloudStakeholderIOTDevicesSmishingVulnerabilityBotnetNon-repudiationWiFiOSINTKeyloggerVishingSegmentationBYODHactivistVPNDarkwebDatabreachSpywareFirewallOSINTSocialengineeringPatchCIATriadZero-daySpamHackerCiphertextBruteforceFrameworkShadowITSteganographyPasswordAIAuthenticationMalwareRiskCloudStakeholderIOTDevicesSmishingVulnerabilityBotnetNon-repudiationWiFiOSINTKeyloggerVishingSegmentationBYODHactivistVPN

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Dark web
  2. Data breach
  3. Spyware
  4. Firewall
  5. OSINT
  6. Social engineering
  7. Patch
  8. CIA Triad
  9. Zero-day
  10. Spam
  11. Hacker
  12. Ciphertext
  13. Brute force
  14. Framework
  15. Shadow IT
  16. Steganography
  17. Password
  18. AI
  19. Authentication
  20. Malware
  21. Risk
  22. Cloud
  23. Stakeholder
  24. IOT Devices
  25. Smishing
  26. Vulnerability
  27. Botnet
  28. Non-repudiation
  29. WiFi
  30. OSINT
  31. Keylogger
  32. Vishing
  33. Segmentation
  34. BYOD
  35. Hactivist
  36. VPN