12CharacterpasswordsScarewareDarkwebPersonallyidentifiableinformation(PII)ClickJackBackupsVulnerabilityVirusCompromiseScreenlockpolicyMulti-factorauthentication(MFA)TrainingZero-dayWhalephishingIntrusionAwarenessWormSpearphishingMalwareBreachExploitPhishingRansomwareSoftwareupdatesCyberattack12CharacterpasswordsScarewareDarkwebPersonallyidentifiableinformation(PII)ClickJackBackupsVulnerabilityVirusCompromiseScreenlockpolicyMulti-factorauthentication(MFA)TrainingZero-dayWhalephishingIntrusionAwarenessWormSpearphishingMalwareBreachExploitPhishingRansomwareSoftwareupdatesCyberattack

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. 12 Character passwords
  2. Scareware
  3. Dark web
  4. Personally identifiable information (PII)
  5. ClickJack
  6. Backups
  7. Vulnerability
  8. Virus
  9. Compromise
  10. Screen lock policy
  11. Multi-factor authentication (MFA)
  12. Training
  13. Zero-day
  14. Whale phishing
  15. Intrusion
  16. Awareness
  17. Worm
  18. Spear phishing
  19. Malware
  20. Breach
  21. Exploit
  22. Phishing
  23. Ransomware
  24. Software updates
  25. Cyberattack