ShadowITHackerHacktivistWiFiSteganographyFirewallCIADatabreachStakeholderVulnerabilityBotnetVPNAuthenticationAISpamSpywareCiphertextMalwareIoTDevicesPasswordBruteforceattackKeyloggerDarkwebRiskBYODCloudPhishingPatchVishingSmishingSocialengineeringNon-repudiationZero-dayOSINTFrameworkShadowITHackerHacktivistWiFiSteganographyFirewallCIADatabreachStakeholderVulnerabilityBotnetVPNAuthenticationAISpamSpywareCiphertextMalwareIoTDevicesPasswordBruteforceattackKeyloggerDarkwebRiskBYODCloudPhishingPatchVishingSmishingSocialengineeringNon-repudiationZero-dayOSINTFramework

Cyber Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Shadow IT
  2. Hacker
  3. Hacktivist
  4. WiFi
  5. Steganography
  6. Firewall
  7. CIA
  8. Data breach
  9. Stakeholder
  10. Vulnerability
  11. Botnet
  12. VPN
  13. Authentication
  14. AI
  15. Spam
  16. Spyware
  17. Ciphertext
  18. Malware
  19. IoT Devices
  20. Password
  21. Brute force attack
  22. Keylogger
  23. Dark web
  24. Risk
  25. BYOD
  26. Cloud
  27. Phishing
  28. Patch
  29. Vishing
  30. Smishing
  31. Social engineering
  32. Non-repudiation
  33. Zero-day
  34. OSINT
  35. Framework