PhishingEncryptionMalwareethicsPublic KeyEncryptionbiasKeyloggingdataethicsrowsMulti-factorAuthenticationdatacollectionRougeAccessPointattributeComputingInnovationcellsDecryptiondatarightsdatasciencecolumnsdatastorytellingsamplesizedataquestionexpositorydata storypersuasivedata storyPhishingEncryptionMalwareethicsPublic KeyEncryptionbiasKeyloggingdataethicsrowsMulti-factorAuthenticationdatacollectionRougeAccessPointattributeComputingInnovationcellsDecryptiondatarightsdatasciencecolumnsdatastorytellingsamplesizedataquestionexpositorydata storypersuasivedata story

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Phishing
  2. Encryption
  3. Malware
  4. ethics
  5. Public Key Encryption
  6. bias
  7. Keylogging
  8. data ethics
  9. rows
  10. Multi-factor Authentication
  11. data collection
  12. Rouge Access Point
  13. attribute
  14. Computing Innovation
  15. cells
  16. Decryption
  17. data rights
  18. data science
  19. columns
  20. data storytelling
  21. sample size
  22. data question
  23. expository data story
  24. persuasive data story