AwarenessTrainingPasswordManagerSecurityLiaisonEncryptionPersonallyidentifiableinformation(PII)Multi-factorauthentication(MFA)WormMalwareExtorsionPhishingSoftwareupdatesWhalephishingScreenlockpolicyScareWareVulnerabilityDarkwebSpearphishingScarewareZero-dayBackupsCyberattackExploitIntrusionBreachVirusAwarenessTrainingPasswordManagerSecurityLiaisonEncryptionPersonallyidentifiableinformation(PII)Multi-factorauthentication(MFA)WormMalwareExtorsionPhishingSoftwareupdatesWhalephishingScreenlockpolicyScareWareVulnerabilityDarkwebSpearphishingScarewareZero-dayBackupsCyberattackExploitIntrusionBreachVirus

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Awareness Training
  2. Password Manager
  3. Security Liaison
  4. Encryption
  5. Personally identifiable information (PII)
  6. Multi-factor authentication (MFA)
  7. Worm
  8. Malware
  9. Extorsion
  10. Phishing
  11. Software updates
  12. Whale phishing
  13. Screen lock policy
  14. ScareWare
  15. Vulnerability
  16. Dark web
  17. Spear phishing
  18. Scareware
  19. Zero-day
  20. Backups
  21. Cyberattack
  22. Exploit
  23. Intrusion
  24. Breach
  25. Virus