DarkwebScareWareSoftwareupdatesMulti-factorauthentication(MFA)VulnerabilitySpearphishingMalwareWhalephishingZero-dayPhishingBreachExtorsionScreenlockpolicyVirusWormAwarenessTrainingSecurityLiaisonEncryptionPasswordManagerExploitCyberattackScarewarePersonallyidentifiableinformation(PII)IntrusionBackupsDarkwebScareWareSoftwareupdatesMulti-factorauthentication(MFA)VulnerabilitySpearphishingMalwareWhalephishingZero-dayPhishingBreachExtorsionScreenlockpolicyVirusWormAwarenessTrainingSecurityLiaisonEncryptionPasswordManagerExploitCyberattackScarewarePersonallyidentifiableinformation(PII)IntrusionBackups

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Dark web
  2. ScareWare
  3. Software updates
  4. Multi-factor authentication (MFA)
  5. Vulnerability
  6. Spear phishing
  7. Malware
  8. Whale phishing
  9. Zero-day
  10. Phishing
  11. Breach
  12. Extorsion
  13. Screen lock policy
  14. Virus
  15. Worm
  16. Awareness Training
  17. Security Liaison
  18. Encryption
  19. Password Manager
  20. Exploit
  21. Cyberattack
  22. Scareware
  23. Personally identifiable information (PII)
  24. Intrusion
  25. Backups