This bingo card has a free space and 50 words: 1. Authentication, 2. Authorization, 3. Encryption, 4. Firewall, 5. Malware, 6. Phishing, 7. Ransomware, 8. Spyware, 9. Trojan, 10. Virus, 11. Vulnerability, 12. Patch, 13. Breach, 14. Insider Threat, 15. Social Engineering, 16. Zero-Day, 17. Multi-Factor Authentication (MFA), 18. Access Control, 19. Endpoint Security, 20. Cyber Attack, 21. Data Privacy, 22. Threat Intelligence, 23. Incident Response, 24. Risk Assessment, 25. Compliance, 26. Security Policy, 27. Penetration Testing, 28. Data Leak, 29. Backup, 30. Recovery Plan, 31. Denial-of-Service (DoS), 32. Intrusion Detection, 33. Secure Socket Layer (SSL), 34. Transport Layer Security (TLS), 35. Digital Signature, 36. Security Awareness, 37. Biometrics, 38. Cloud Security, 39. Identity Theft, 40. Data Encryption Standard (DES), 41. Public Key Infrastructure (PKI), 42. Security Audit, 43. Session Hijacking, 44. Tokenization, 45. Certificate Authority, 46. Secure Coding, 47. Physical Security, 48. Security Information and Event Management (SIEM), 49. Access Logs and 50. Network Segmentation.
It's Security BINGO | IBA Lesson 8 | InfoSec Bingo | CyberSecurity Awareness - 2024 | Essential Cybersecurity Terms
Share this URL with your players:
For more control of your online game, create a clone of this card first.
Learn how to conduct a bingo game.
With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.
Tip: If you want your game to last longer (on average), add more unique words/images to it.