VirusMalwareSpearphishingVulnerabilityIntrusionWhalephishingScarewareCyberattackSoftwareupdatesBreachPhishingBackupsAwarenessTrainingPersonallyidentifiableinformation(PII)DarkwebScreenlockpolicyPasswordManagerZero-dayWormEncryptionExtorsionMulti-factorauthentication(MFA)SecurityLiaisonExploitScareWareVirusMalwareSpearphishingVulnerabilityIntrusionWhalephishingScarewareCyberattackSoftwareupdatesBreachPhishingBackupsAwarenessTrainingPersonallyidentifiableinformation(PII)DarkwebScreenlockpolicyPasswordManagerZero-dayWormEncryptionExtorsionMulti-factorauthentication(MFA)SecurityLiaisonExploitScareWare

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Virus
  2. Malware
  3. Spear phishing
  4. Vulnerability
  5. Intrusion
  6. Whale phishing
  7. Scareware
  8. Cyberattack
  9. Software updates
  10. Breach
  11. Phishing
  12. Backups
  13. Awareness Training
  14. Personally identifiable information (PII)
  15. Dark web
  16. Screen lock policy
  17. Password Manager
  18. Zero-day
  19. Worm
  20. Encryption
  21. Extorsion
  22. Multi-factor authentication (MFA)
  23. Security Liaison
  24. Exploit
  25. ScareWare