IntrusionZero-dayScarewareScareWareVirusMalwareBackupsAwarenessTrainingSecurityLiaisonPhishingSoftwareupdatesEncryptionExploitWormExtorsionVulnerabilityWhalephishingCyberattackSpearphishingPasswordManagerDarkwebBreachPersonallyidentifiableinformation(PII)ScreenlockpolicyMulti-factorauthentication(MFA)IntrusionZero-dayScarewareScareWareVirusMalwareBackupsAwarenessTrainingSecurityLiaisonPhishingSoftwareupdatesEncryptionExploitWormExtorsionVulnerabilityWhalephishingCyberattackSpearphishingPasswordManagerDarkwebBreachPersonallyidentifiableinformation(PII)ScreenlockpolicyMulti-factorauthentication(MFA)

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Intrusion
  2. Zero-day
  3. Scareware
  4. ScareWare
  5. Virus
  6. Malware
  7. Backups
  8. Awareness Training
  9. Security Liaison
  10. Phishing
  11. Software updates
  12. Encryption
  13. Exploit
  14. Worm
  15. Extorsion
  16. Vulnerability
  17. Whale phishing
  18. Cyberattack
  19. Spear phishing
  20. Password Manager
  21. Dark web
  22. Breach
  23. Personally identifiable information (PII)
  24. Screen lock policy
  25. Multi-factor authentication (MFA)