cellsdatarightsMalwareexpositorydata storydatasciencedataquestiondataethicsEncryptionKeyloggingdatastorytellingPublic KeyEncryptiondatacollectioncolumnsRougeAccessPointsamplesizeethicsPhishingMulti-factorAuthenticationComputingInnovationpersuasivedata storyattributerowsbiasDecryptioncellsdatarightsMalwareexpositorydata storydatasciencedataquestiondataethicsEncryptionKeyloggingdatastorytellingPublic KeyEncryptiondatacollectioncolumnsRougeAccessPointsamplesizeethicsPhishingMulti-factorAuthenticationComputingInnovationpersuasivedata storyattributerowsbiasDecryption

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. cells
  2. data rights
  3. Malware
  4. expository data story
  5. data science
  6. data question
  7. data ethics
  8. Encryption
  9. Keylogging
  10. data storytelling
  11. Public Key Encryption
  12. data collection
  13. columns
  14. Rouge Access Point
  15. sample size
  16. ethics
  17. Phishing
  18. Multi-factor Authentication
  19. Computing Innovation
  20. persuasive data story
  21. attribute
  22. rows
  23. bias
  24. Decryption