WormSpearphishingMulti-factorauthentication(MFA)DarkwebExploitViruslockscreen8CharacterPasswordsSoftwareupdatesAwarenessTrainingCompromiseMalwareZero-dayOktaJuiceJackingWhalephishingEncryptionMobileDevicesVulnerabilityIntrusionSecurityAssessmentBreachRansomwareBackdoorWormSpearphishingMulti-factorauthentication(MFA)DarkwebExploitViruslockscreen8CharacterPasswordsSoftwareupdatesAwarenessTrainingCompromiseMalwareZero-dayOktaJuiceJackingWhalephishingEncryptionMobileDevicesVulnerabilityIntrusionSecurityAssessmentBreachRansomwareBackdoor

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Worm
  2. Spear phishing
  3. Multi-factor authentication (MFA)
  4. Dark web
  5. Exploit
  6. Virus
  7. lock screen
  8. 8 Character Passwords
  9. Software updates
  10. Awareness Training
  11. Compromise
  12. Malware
  13. Zero-day
  14. Okta
  15. Juice Jacking
  16. Whale phishing
  17. Encryption
  18. Mobile Devices
  19. Vulnerability
  20. Intrusion
  21. Security Assessment
  22. Breach
  23. Ransomware
  24. Backdoor