MalwareEncryptionPhishingTrainingSpearphishingMulti-factorauthentication(MFA)WhalephishingWormAwarenessTrainingZero-dayDarkwebCompromiseRansomwareReusingpasswordsScreenlockpolicyDatadumpIABsBufferoverflowTORBreachVulnerabilitySoftwareupdatesExploitIntrusionMalwareEncryptionPhishingTrainingSpearphishingMulti-factorauthentication(MFA)WhalephishingWormAwarenessTrainingZero-dayDarkwebCompromiseRansomwareReusingpasswordsScreenlockpolicyDatadumpIABsBufferoverflowTORBreachVulnerabilitySoftwareupdatesExploitIntrusion

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Malware
  2. Encryption
  3. Phishing
  4. Training
  5. Spear phishing
  6. Multi-factor authentication (MFA)
  7. Whale phishing
  8. Worm
  9. Awareness Training
  10. Zero-day
  11. Dark web
  12. Compromise
  13. Ransomware
  14. Reusing passwords
  15. Screen lock policy
  16. Data dump
  17. IABs
  18. Buffer overflow
  19. TOR
  20. Breach
  21. Vulnerability
  22. Software updates
  23. Exploit
  24. Intrusion