SoftwareupdatesScreenlockpolicyVirusIntrusionWhalephishingEncryptionSpearphishingCyberattackWormScarewareBackupsVulnerabilityBreachPersonallyidentifiableinformation(PII)ExtorsionMalwareSecurityLiaisonDarkwebAwarenessTrainingZero-dayMulti-factorauthentication(MFA)ExploitPhishingScareWarePasswordManagerSoftwareupdatesScreenlockpolicyVirusIntrusionWhalephishingEncryptionSpearphishingCyberattackWormScarewareBackupsVulnerabilityBreachPersonallyidentifiableinformation(PII)ExtorsionMalwareSecurityLiaisonDarkwebAwarenessTrainingZero-dayMulti-factorauthentication(MFA)ExploitPhishingScareWarePasswordManager

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Software updates
  2. Screen lock policy
  3. Virus
  4. Intrusion
  5. Whale phishing
  6. Encryption
  7. Spear phishing
  8. Cyberattack
  9. Worm
  10. Scareware
  11. Backups
  12. Vulnerability
  13. Breach
  14. Personally identifiable information (PII)
  15. Extorsion
  16. Malware
  17. Security Liaison
  18. Dark web
  19. Awareness Training
  20. Zero-day
  21. Multi-factor authentication (MFA)
  22. Exploit
  23. Phishing
  24. ScareWare
  25. Password Manager