CIATriadSpamSteganographyRiskAIHackerBotnetDatabreachSocialengineeringNon-repudiationVPNPasswordIOTDevicesSpywareZero-dayStakeholderCiphertextDarkwebPatchCloudOSINTHactivistBruteforceVulnerabilityVishingSmishingShadowITWiFiKeyloggerFirewallFrameworkAuthenticationOSINTMalwareBYODSegmentationCIATriadSpamSteganographyRiskAIHackerBotnetDatabreachSocialengineeringNon-repudiationVPNPasswordIOTDevicesSpywareZero-dayStakeholderCiphertextDarkwebPatchCloudOSINTHactivistBruteforceVulnerabilityVishingSmishingShadowITWiFiKeyloggerFirewallFrameworkAuthenticationOSINTMalwareBYODSegmentation

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. CIA Triad
  2. Spam
  3. Steganography
  4. Risk
  5. AI
  6. Hacker
  7. Botnet
  8. Data breach
  9. Social engineering
  10. Non-repudiation
  11. VPN
  12. Password
  13. IOT Devices
  14. Spyware
  15. Zero-day
  16. Stakeholder
  17. Ciphertext
  18. Dark web
  19. Patch
  20. Cloud
  21. OSINT
  22. Hactivist
  23. Brute force
  24. Vulnerability
  25. Vishing
  26. Smishing
  27. Shadow IT
  28. WiFi
  29. Keylogger
  30. Firewall
  31. Framework
  32. Authentication
  33. OSINT
  34. Malware
  35. BYOD
  36. Segmentation