SocialEngineeringDataBreachEncryptionIncidentResponseRansomwareFree!Two-FactorAuthentication(2FA)PasswordStrengthPhishingAccessControlPatchManagementIntrusionDetectionSystem(IDS)NetworkSecurityMalwareFirewallVulnerabilitySocialEngineeringDataBreachEncryptionIncidentResponseRansomwareFree!Two-FactorAuthentication(2FA)PasswordStrengthPhishingAccessControlPatchManagementIntrusionDetectionSystem(IDS)NetworkSecurityMalwareFirewallVulnerability

Cyber Awareness - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Social Engineering
  2. Data Breach
  3. Encryption
  4. Incident Response
  5. Ransomware
  6. Free!
  7. Two-Factor Authentication (2FA)
  8. Password Strength
  9. Phishing
  10. Access Control
  11. Patch Management
  12. Intrusion Detection System (IDS)
  13. Network Security
  14. Malware
  15. Firewall
  16. Vulnerability