CyberattackAwarenessTrainingWormZero-dayWhalephishingExtorsionEncryptionMalwareDarkwebBackupsExploitPasswordManagerSecurityLiaisonScareWareVirusMulti-factorauthentication(MFA)SpearphishingBreachIntrusionPhishingVulnerabilityPersonallyidentifiableinformation(PII)SoftwareupdatesScarewareScreenlockpolicyCyberattackAwarenessTrainingWormZero-dayWhalephishingExtorsionEncryptionMalwareDarkwebBackupsExploitPasswordManagerSecurityLiaisonScareWareVirusMulti-factorauthentication(MFA)SpearphishingBreachIntrusionPhishingVulnerabilityPersonallyidentifiableinformation(PII)SoftwareupdatesScarewareScreenlockpolicy

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Cyberattack
  2. Awareness Training
  3. Worm
  4. Zero-day
  5. Whale phishing
  6. Extorsion
  7. Encryption
  8. Malware
  9. Dark web
  10. Backups
  11. Exploit
  12. Password Manager
  13. Security Liaison
  14. ScareWare
  15. Virus
  16. Multi-factor authentication (MFA)
  17. Spear phishing
  18. Breach
  19. Intrusion
  20. Phishing
  21. Vulnerability
  22. Personally identifiable information (PII)
  23. Software updates
  24. Scareware
  25. Screen lock policy