This bingo card has 66 words: Phishing, Malware, Ransomware, Encryption, Spyware, Social engineering, VPN (Virtual Private Network), Zero-day exploit, Firewall, Insider threat, Phish Alert Button (PAB), Password manager, Brute force attack, Multi-factor authentication (MFA), Data breach, Vulnerability, Keylogger, Free!, Patch update, DDoS attack (Distributed Denial of Service), Tokenization, Incident response, Dark web, Blocklisting, Cyber hygiene, Public data, Restricted data, Data classification, Acceptable Use Policy, Restricted country, Credential stuffing, Compliance, Zero Trust, Digital footprint, Clean desk policy, Privilege escalation, spear phishing, Business email compromise (BEC), endpoint security, penetration testing, confidential data, sand box, attack vector, threat actor, backdoor, vishing, smishing, Security audit, Incident Response Team, Adware, removable media, Keeper, shadow IT, Spoofed domain, Tailgating, BYOD (Bring Your Own Device), Deepfake, Misinformation (AI), Virus, Access control, Role-based access control, Annual security training, Role-based training, Remediation Training, Policy Violation and Impersonation.
It's Security BINGO | Essential Cybersecurity Terms | APN SAT 2024 | CyberSecurity Awareness - 2024 | APN SAT 2024
Share this URL with your players:
For more control of your online game, create a clone of this card first.
Learn how to conduct a bingo game.
With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.
Tip: If you want your game to last longer (on average), add more unique words/images to it.