CIASmishingPatchIoTDevicesHacktivistSocialengineeringRiskZero-dayAuthenticationCiphertextFrameworkStakeholderPhishingBotnetVPNShadowITOSINTFirewallHackerDarkwebWiFiSteganographyVishingBYODBruteforceattackMalwareAIDatabreachSpywareNon-repudiationPasswordKeyloggerCloudSpamVulnerabilityCIASmishingPatchIoTDevicesHacktivistSocialengineeringRiskZero-dayAuthenticationCiphertextFrameworkStakeholderPhishingBotnetVPNShadowITOSINTFirewallHackerDarkwebWiFiSteganographyVishingBYODBruteforceattackMalwareAIDatabreachSpywareNon-repudiationPasswordKeyloggerCloudSpamVulnerability

Cyber Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. CIA
  2. Smishing
  3. Patch
  4. IoT Devices
  5. Hacktivist
  6. Social engineering
  7. Risk
  8. Zero-day
  9. Authentication
  10. Ciphertext
  11. Framework
  12. Stakeholder
  13. Phishing
  14. Botnet
  15. VPN
  16. Shadow IT
  17. OSINT
  18. Firewall
  19. Hacker
  20. Dark web
  21. WiFi
  22. Steganography
  23. Vishing
  24. BYOD
  25. Brute force attack
  26. Malware
  27. AI
  28. Data breach
  29. Spyware
  30. Non-repudiation
  31. Password
  32. Keylogger
  33. Cloud
  34. Spam
  35. Vulnerability