AwarenessWormPersonallyidentifiableinformation(PII)MalwareSpearphishingWhalephishingCompromiseScreenlockpolicyPhishingZero-dayReusingpasswordsVirusIntrusionVulnerabilitySoftwareupdatesDarkwebTrainingRansomwareEncryptionMulti-factorauthentication(MFA)DatadumpBufferoverflowExploitBreachAwarenessWormPersonallyidentifiableinformation(PII)MalwareSpearphishingWhalephishingCompromiseScreenlockpolicyPhishingZero-dayReusingpasswordsVirusIntrusionVulnerabilitySoftwareupdatesDarkwebTrainingRansomwareEncryptionMulti-factorauthentication(MFA)DatadumpBufferoverflowExploitBreach

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Awareness
  2. Worm
  3. Personally identifiable information (PII)
  4. Malware
  5. Spear phishing
  6. Whale phishing
  7. Compromise
  8. Screen lock policy
  9. Phishing
  10. Zero-day
  11. Reusing passwords
  12. Virus
  13. Intrusion
  14. Vulnerability
  15. Software updates
  16. Dark web
  17. Training
  18. Ransomware
  19. Encryption
  20. Multi-factor authentication (MFA)
  21. Data dump
  22. Buffer overflow
  23. Exploit
  24. Breach