RiskDarkwebStakeholderIOTDevicesHactivistSpywareNon-repudiationSteganographyCiphertextVulnerabilityAIWiFiDatabreachKeyloggerShadowITPasswordVishingSegmentationFrameworkOSINTSocialengineeringAuthenticationSmishingMalwareCIATriadVPNBotnetFirewallHackerPatchZero-dayBruteforceBYODSpamCloudOSINTRiskDarkwebStakeholderIOTDevicesHactivistSpywareNon-repudiationSteganographyCiphertextVulnerabilityAIWiFiDatabreachKeyloggerShadowITPasswordVishingSegmentationFrameworkOSINTSocialengineeringAuthenticationSmishingMalwareCIATriadVPNBotnetFirewallHackerPatchZero-dayBruteforceBYODSpamCloudOSINT

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Risk
  2. Dark web
  3. Stakeholder
  4. IOT Devices
  5. Hactivist
  6. Spyware
  7. Non-repudiation
  8. Steganography
  9. Ciphertext
  10. Vulnerability
  11. AI
  12. WiFi
  13. Data breach
  14. Keylogger
  15. Shadow IT
  16. Password
  17. Vishing
  18. Segmentation
  19. Framework
  20. OSINT
  21. Social engineering
  22. Authentication
  23. Smishing
  24. Malware
  25. CIA Triad
  26. VPN
  27. Botnet
  28. Firewall
  29. Hacker
  30. Patch
  31. Zero-day
  32. Brute force
  33. BYOD
  34. Spam
  35. Cloud
  36. OSINT