Zero-dayPersonallyidentifiableinformation(PII)WhalephishingSoftwareupdatesRansomwareScreenlockpolicyVulnerabilitySpearphishingVirusAwarenessWormMulti-factorauthentication(MFA)MalwareDatadumpReusingpasswordsIntrusionTrainingBreachBufferoverflowPhishingCompromiseExploitEncryptionDarkwebZero-dayPersonallyidentifiableinformation(PII)WhalephishingSoftwareupdatesRansomwareScreenlockpolicyVulnerabilitySpearphishingVirusAwarenessWormMulti-factorauthentication(MFA)MalwareDatadumpReusingpasswordsIntrusionTrainingBreachBufferoverflowPhishingCompromiseExploitEncryptionDarkweb

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Zero-day
  2. Personally identifiable information (PII)
  3. Whale phishing
  4. Software updates
  5. Ransomware
  6. Screen lock policy
  7. Vulnerability
  8. Spear phishing
  9. Virus
  10. Awareness
  11. Worm
  12. Multi-factor authentication (MFA)
  13. Malware
  14. Data dump
  15. Reusing passwords
  16. Intrusion
  17. Training
  18. Breach
  19. Buffer overflow
  20. Phishing
  21. Compromise
  22. Exploit
  23. Encryption
  24. Dark web