BYODNon-repudiationMalwareSpamOSINTBotnetRiskAuthenticationSocialengineeringPatchCloudSteganographyCIAFirewallHacktivistDarkwebIoTDevicesVPNPhishingAIKeyloggerVulnerabilityPasswordWiFiSpywareHackerCiphertextStakeholderZero-dayBruteforceattackVishingShadowITSmishingFrameworkDatabreachBYODNon-repudiationMalwareSpamOSINTBotnetRiskAuthenticationSocialengineeringPatchCloudSteganographyCIAFirewallHacktivistDarkwebIoTDevicesVPNPhishingAIKeyloggerVulnerabilityPasswordWiFiSpywareHackerCiphertextStakeholderZero-dayBruteforceattackVishingShadowITSmishingFrameworkDatabreach

Cyber Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. BYOD
  2. Non-repudiation
  3. Malware
  4. Spam
  5. OSINT
  6. Botnet
  7. Risk
  8. Authentication
  9. Social engineering
  10. Patch
  11. Cloud
  12. Steganography
  13. CIA
  14. Firewall
  15. Hacktivist
  16. Dark web
  17. IoT Devices
  18. VPN
  19. Phishing
  20. AI
  21. Keylogger
  22. Vulnerability
  23. Password
  24. WiFi
  25. Spyware
  26. Hacker
  27. Ciphertext
  28. Stakeholder
  29. Zero-day
  30. Brute force attack
  31. Vishing
  32. Shadow IT
  33. Smishing
  34. Framework
  35. Data breach