VulnerabilityMalwareExploitSoftwareupdatesSecurityLiaisonScreenlockpolicyPhishingWhalephishingScareWareBackupsIntrusionBreachCyberattackExtorsionSpearphishingVirusZero-dayAwarenessTrainingEncryptionMulti-factorauthentication(MFA)ScarewareWormPersonallyidentifiableinformation(PII)PasswordManagerDarkwebVulnerabilityMalwareExploitSoftwareupdatesSecurityLiaisonScreenlockpolicyPhishingWhalephishingScareWareBackupsIntrusionBreachCyberattackExtorsionSpearphishingVirusZero-dayAwarenessTrainingEncryptionMulti-factorauthentication(MFA)ScarewareWormPersonallyidentifiableinformation(PII)PasswordManagerDarkweb

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Vulnerability
  2. Malware
  3. Exploit
  4. Software updates
  5. Security Liaison
  6. Screen lock policy
  7. Phishing
  8. Whale phishing
  9. ScareWare
  10. Backups
  11. Intrusion
  12. Breach
  13. Cyberattack
  14. Extorsion
  15. Spear phishing
  16. Virus
  17. Zero-day
  18. Awareness Training
  19. Encryption
  20. Multi-factor authentication (MFA)
  21. Scareware
  22. Worm
  23. Personally identifiable information (PII)
  24. Password Manager
  25. Dark web