MalwareCompromiseTrainingTORReusingpasswordsExploitSoftwareupdatesIntrusionEncryptionZero-dayBreachSpearphishingWhalephishingMulti-factorauthentication(MFA)AwarenessTrainingIABsRansomwareVulnerabilityScreenlockpolicyPhishingBufferoverflowWormDarkwebDatadumpMalwareCompromiseTrainingTORReusingpasswordsExploitSoftwareupdatesIntrusionEncryptionZero-dayBreachSpearphishingWhalephishingMulti-factorauthentication(MFA)AwarenessTrainingIABsRansomwareVulnerabilityScreenlockpolicyPhishingBufferoverflowWormDarkwebDatadump

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Malware
  2. Compromise
  3. Training
  4. TOR
  5. Reusing passwords
  6. Exploit
  7. Software updates
  8. Intrusion
  9. Encryption
  10. Zero-day
  11. Breach
  12. Spear phishing
  13. Whale phishing
  14. Multi-factor authentication (MFA)
  15. Awareness Training
  16. IABs
  17. Ransomware
  18. Vulnerability
  19. Screen lock policy
  20. Phishing
  21. Buffer overflow
  22. Worm
  23. Dark web
  24. Data dump