DatadumpReusingpasswordsWormBreachMulti-factorauthentication(MFA)Personallyidentifiableinformation(PII)MalwareTrainingZero-dayEncryptionCompromiseDarkwebBufferoverflowSoftwareupdatesWhalephishingSpearphishingVirusAwarenessPhishingIntrusionRansomwareScreenlockpolicyExploitVulnerabilityDatadumpReusingpasswordsWormBreachMulti-factorauthentication(MFA)Personallyidentifiableinformation(PII)MalwareTrainingZero-dayEncryptionCompromiseDarkwebBufferoverflowSoftwareupdatesWhalephishingSpearphishingVirusAwarenessPhishingIntrusionRansomwareScreenlockpolicyExploitVulnerability

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Data dump
  2. Reusing passwords
  3. Worm
  4. Breach
  5. Multi-factor authentication (MFA)
  6. Personally identifiable information (PII)
  7. Malware
  8. Training
  9. Zero-day
  10. Encryption
  11. Compromise
  12. Dark web
  13. Buffer overflow
  14. Software updates
  15. Whale phishing
  16. Spear phishing
  17. Virus
  18. Awareness
  19. Phishing
  20. Intrusion
  21. Ransomware
  22. Screen lock policy
  23. Exploit
  24. Vulnerability