ScarewareExploitSpearphishingDarkwebIntrusionScreenlockpolicyBackupsScareWareMalwareMulti-factorauthentication(MFA)WhalephishingZero-dayBreachWormSecurityLiaisonPhishingCyberattackPasswordManagerEncryptionAwarenessTrainingVulnerabilityPersonallyidentifiableinformation(PII)SoftwareupdatesExtorsionVirusScarewareExploitSpearphishingDarkwebIntrusionScreenlockpolicyBackupsScareWareMalwareMulti-factorauthentication(MFA)WhalephishingZero-dayBreachWormSecurityLiaisonPhishingCyberattackPasswordManagerEncryptionAwarenessTrainingVulnerabilityPersonallyidentifiableinformation(PII)SoftwareupdatesExtorsionVirus

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Scareware
  2. Exploit
  3. Spear phishing
  4. Dark web
  5. Intrusion
  6. Screen lock policy
  7. Backups
  8. ScareWare
  9. Malware
  10. Multi-factor authentication (MFA)
  11. Whale phishing
  12. Zero-day
  13. Breach
  14. Worm
  15. Security Liaison
  16. Phishing
  17. Cyberattack
  18. Password Manager
  19. Encryption
  20. Awareness Training
  21. Vulnerability
  22. Personally identifiable information (PII)
  23. Software updates
  24. Extorsion
  25. Virus