ReusingpasswordsMalwareDatadumpVulnerabilityPhishingDarkwebAwarenessEncryptionWormScreenlockpolicyMulti-factorauthentication(MFA)RansomwareExploitSpearphishingIntrusionPersonallyidentifiableinformation(PII)TrainingBufferoverflowWhalephishingBreachZero-dayVirusCompromiseSoftwareupdatesReusingpasswordsMalwareDatadumpVulnerabilityPhishingDarkwebAwarenessEncryptionWormScreenlockpolicyMulti-factorauthentication(MFA)RansomwareExploitSpearphishingIntrusionPersonallyidentifiableinformation(PII)TrainingBufferoverflowWhalephishingBreachZero-dayVirusCompromiseSoftwareupdates

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Reusing passwords
  2. Malware
  3. Data dump
  4. Vulnerability
  5. Phishing
  6. Dark web
  7. Awareness
  8. Encryption
  9. Worm
  10. Screen lock policy
  11. Multi-factor authentication (MFA)
  12. Ransomware
  13. Exploit
  14. Spear phishing
  15. Intrusion
  16. Personally identifiable information (PII)
  17. Training
  18. Buffer overflow
  19. Whale phishing
  20. Breach
  21. Zero-day
  22. Virus
  23. Compromise
  24. Software updates