Security

Security Bingo Card
Preview

This bingo card has a free space and 34 words: virus, trojan horse, adware, ransomware, rootkit, spyware, worm, zero-day, zero-hour, phishing, spear phishing, spam, baiting, signature file, reconnaisaance, DoS, DDoS, DNS Poisoning, Man-in-the-Middle, Spoofing, Syn Flood, Replay, Social Engineering, Impersonation, Tailgating, Shoulder Surfing, Dumpster diving, security Policy, Mantrap, conventional lock, deadbolt lock, electronic lock, token-based lock and biometric lock.

More like this:

RGL Cybersecurity Bingo | Cybersecurity Bingo | Cybersecurity Bingo | Cybersecurity Bingo | Cybersecurity Bingo

Play Online

Share this URL with your players:

For more control of your online game, create a clone of this card first.

Learn how to conduct a bingo game.

Call List

Probabilities

With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.

Tip: If you want your game to last longer (on average), add more unique words/images to it.