VirusPersonallyidentifiableinformation(PII)TrainingVulnerabilityIntrusionAwarenessTrainingCyberattackMulti-factorauthentication(MFA)WhalephishingEncryptionScarewarePasswordManagerBreachExtorsionBackupsScreenlockpolicyCompromiseSoftwareupdatesPhishingZero-dayWormExploitSpearphishingMalwareDarkwebVirusPersonallyidentifiableinformation(PII)TrainingVulnerabilityIntrusionAwarenessTrainingCyberattackMulti-factorauthentication(MFA)WhalephishingEncryptionScarewarePasswordManagerBreachExtorsionBackupsScreenlockpolicyCompromiseSoftwareupdatesPhishingZero-dayWormExploitSpearphishingMalwareDarkweb

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Virus
  2. Personally identifiable information (PII)
  3. Training
  4. Vulnerability
  5. Intrusion
  6. Awareness Training
  7. Cyberattack
  8. Multi-factor authentication (MFA)
  9. Whale phishing
  10. Encryption
  11. Scareware
  12. Password Manager
  13. Breach
  14. Extorsion
  15. Backups
  16. Screen lock policy
  17. Compromise
  18. Software updates
  19. Phishing
  20. Zero-day
  21. Worm
  22. Exploit
  23. Spear phishing
  24. Malware
  25. Dark web