ExploitExtorsionCompromise8CharacterPasswordsWormIntrusionRansomwareAwarenessTrainingSoftwareupdatesJuiceJackingMalwareSpearphishingDarkwebTrainingPhishingVirusPassphraseZero-daylockscreenEncryptionMulti-factorauthentication(MFA)GTABreachWhalephishingExploitExtorsionCompromise8CharacterPasswordsWormIntrusionRansomwareAwarenessTrainingSoftwareupdatesJuiceJackingMalwareSpearphishingDarkwebTrainingPhishingVirusPassphraseZero-daylockscreenEncryptionMulti-factorauthentication(MFA)GTABreachWhalephishing

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Exploit
  2. Extorsion
  3. Compromise
  4. 8 Character Passwords
  5. Worm
  6. Intrusion
  7. Ransomware
  8. Awareness Training
  9. Software updates
  10. Juice Jacking
  11. Malware
  12. Spear phishing
  13. Dark web
  14. Training
  15. Phishing
  16. Virus
  17. Passphrase
  18. Zero-day
  19. lock screen
  20. Encryption
  21. Multi-factor authentication (MFA)
  22. GTA
  23. Breach
  24. Whale phishing