MalwareCiphertextHackerCloudVPNWiFiIOTDevicesFirewallSegmentationAISteganographySocialengineeringDarkwebPatchRiskBruteforceCIATriadSpywareOSINTOSINTStakeholderSmishingKeyloggerPasswordNon-repudiationShadowITBotnetFrameworkVulnerabilityZero-dayBYODDatabreachSpamAuthenticationHactivistVishingMalwareCiphertextHackerCloudVPNWiFiIOTDevicesFirewallSegmentationAISteganographySocialengineeringDarkwebPatchRiskBruteforceCIATriadSpywareOSINTOSINTStakeholderSmishingKeyloggerPasswordNon-repudiationShadowITBotnetFrameworkVulnerabilityZero-dayBYODDatabreachSpamAuthenticationHactivistVishing

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Malware
  2. Ciphertext
  3. Hacker
  4. Cloud
  5. VPN
  6. WiFi
  7. IOT Devices
  8. Firewall
  9. Segmentation
  10. AI
  11. Steganography
  12. Social engineering
  13. Dark web
  14. Patch
  15. Risk
  16. Brute force
  17. CIA Triad
  18. Spyware
  19. OSINT
  20. OSINT
  21. Stakeholder
  22. Smishing
  23. Keylogger
  24. Password
  25. Non-repudiation
  26. Shadow IT
  27. Botnet
  28. Framework
  29. Vulnerability
  30. Zero-day
  31. BYOD
  32. Data breach
  33. Spam
  34. Authentication
  35. Hactivist
  36. Vishing