RiskSmishingDatabreachMalwareSegmentationWiFiVPNBYODSpamSocialengineeringCIATriadZero-dayFrameworkBotnetIOTDevicesOSINTCloudSteganographySpywareAIBruteforceFirewallCiphertextKeyloggerHactivistNon-repudiationPasswordVulnerabilityAuthenticationVishingStakeholderDarkwebPatchOSINTHackerShadowITRiskSmishingDatabreachMalwareSegmentationWiFiVPNBYODSpamSocialengineeringCIATriadZero-dayFrameworkBotnetIOTDevicesOSINTCloudSteganographySpywareAIBruteforceFirewallCiphertextKeyloggerHactivistNon-repudiationPasswordVulnerabilityAuthenticationVishingStakeholderDarkwebPatchOSINTHackerShadowIT

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Risk
  2. Smishing
  3. Data breach
  4. Malware
  5. Segmentation
  6. WiFi
  7. VPN
  8. BYOD
  9. Spam
  10. Social engineering
  11. CIA Triad
  12. Zero-day
  13. Framework
  14. Botnet
  15. IOT Devices
  16. OSINT
  17. Cloud
  18. Steganography
  19. Spyware
  20. AI
  21. Brute force
  22. Firewall
  23. Ciphertext
  24. Keylogger
  25. Hactivist
  26. Non-repudiation
  27. Password
  28. Vulnerability
  29. Authentication
  30. Vishing
  31. Stakeholder
  32. Dark web
  33. Patch
  34. OSINT
  35. Hacker
  36. Shadow IT