VulnerabilitySegmentationSocialengineeringCIATriadBYODAIPatchSpamWiFiOSINTSmishingVishingMalwareBotnetDatabreachNon-repudiationSpywareDarkwebCiphertextHackerSteganographyCloudPasswordOSINTKeyloggerFrameworkShadowITIOTDevicesZero-dayHactivistBruteforceStakeholderVPNRiskFirewallAuthenticationVulnerabilitySegmentationSocialengineeringCIATriadBYODAIPatchSpamWiFiOSINTSmishingVishingMalwareBotnetDatabreachNon-repudiationSpywareDarkwebCiphertextHackerSteganographyCloudPasswordOSINTKeyloggerFrameworkShadowITIOTDevicesZero-dayHactivistBruteforceStakeholderVPNRiskFirewallAuthentication

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Vulnerability
  2. Segmentation
  3. Social engineering
  4. CIA Triad
  5. BYOD
  6. AI
  7. Patch
  8. Spam
  9. WiFi
  10. OSINT
  11. Smishing
  12. Vishing
  13. Malware
  14. Botnet
  15. Data breach
  16. Non-repudiation
  17. Spyware
  18. Dark web
  19. Ciphertext
  20. Hacker
  21. Steganography
  22. Cloud
  23. Password
  24. OSINT
  25. Keylogger
  26. Framework
  27. Shadow IT
  28. IOT Devices
  29. Zero-day
  30. Hactivist
  31. Brute force
  32. Stakeholder
  33. VPN
  34. Risk
  35. Firewall
  36. Authentication