EncryptiondatacollectioncellsPublic KeyEncryptionDecryptionattributeComputingInnovationexpositorydata storydatarightsRougeAccessPointrowscolumnsMalwarePhishingethicsdatastorytellingpersuasivedata storyKeyloggingdataethicsbiasdatasciencedataquestionsamplesizeMulti-factorAuthenticationEncryptiondatacollectioncellsPublic KeyEncryptionDecryptionattributeComputingInnovationexpositorydata storydatarightsRougeAccessPointrowscolumnsMalwarePhishingethicsdatastorytellingpersuasivedata storyKeyloggingdataethicsbiasdatasciencedataquestionsamplesizeMulti-factorAuthentication

Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Encryption
  2. data collection
  3. cells
  4. Public Key Encryption
  5. Decryption
  6. attribute
  7. Computing Innovation
  8. expository data story
  9. data rights
  10. Rouge Access Point
  11. rows
  12. columns
  13. Malware
  14. Phishing
  15. ethics
  16. data storytelling
  17. persuasive data story
  18. Keylogging
  19. data ethics
  20. bias
  21. data science
  22. data question
  23. sample size
  24. Multi-factor Authentication