SecurityLiaisonIntrusionScareWarePasswordManagerPersonallyidentifiableinformation(PII)SpearphishingBackupsWhalephishingMalwarePhishingCyberattackVulnerabilityExtorsionAwarenessTrainingExploitScreenlockpolicyVirusWormBreachEncryptionDarkwebMulti-factorauthentication(MFA)SoftwareupdatesZero-dayScarewareSecurityLiaisonIntrusionScareWarePasswordManagerPersonallyidentifiableinformation(PII)SpearphishingBackupsWhalephishingMalwarePhishingCyberattackVulnerabilityExtorsionAwarenessTrainingExploitScreenlockpolicyVirusWormBreachEncryptionDarkwebMulti-factorauthentication(MFA)SoftwareupdatesZero-dayScareware

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Security Liaison
  2. Intrusion
  3. ScareWare
  4. Password Manager
  5. Personally identifiable information (PII)
  6. Spear phishing
  7. Backups
  8. Whale phishing
  9. Malware
  10. Phishing
  11. Cyberattack
  12. Vulnerability
  13. Extorsion
  14. Awareness Training
  15. Exploit
  16. Screen lock policy
  17. Virus
  18. Worm
  19. Breach
  20. Encryption
  21. Dark web
  22. Multi-factor authentication (MFA)
  23. Software updates
  24. Zero-day
  25. Scareware