Personallyidentifiableinformation(PII)DarkwebPhishingWhalephishingEncryptionVulnerabilityIntrusionScreenlockpolicyBackupsScarewareExploitCyberattackAwarenessTrainingMulti-factorauthentication(MFA)ScareWareWormVirusBreachZero-daySoftwareupdatesSpearphishingExtorsionSecurityLiaisonMalwarePasswordManagerPersonallyidentifiableinformation(PII)DarkwebPhishingWhalephishingEncryptionVulnerabilityIntrusionScreenlockpolicyBackupsScarewareExploitCyberattackAwarenessTrainingMulti-factorauthentication(MFA)ScareWareWormVirusBreachZero-daySoftwareupdatesSpearphishingExtorsionSecurityLiaisonMalwarePasswordManager

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Personally identifiable information (PII)
  2. Dark web
  3. Phishing
  4. Whale phishing
  5. Encryption
  6. Vulnerability
  7. Intrusion
  8. Screen lock policy
  9. Backups
  10. Scareware
  11. Exploit
  12. Cyberattack
  13. Awareness Training
  14. Multi-factor authentication (MFA)
  15. ScareWare
  16. Worm
  17. Virus
  18. Breach
  19. Zero-day
  20. Software updates
  21. Spear phishing
  22. Extorsion
  23. Security Liaison
  24. Malware
  25. Password Manager