VirusMulti-factorauthentication(MFA)VulnerabilityExploitMalwareSecurityAssessmentZero-daySpearphishingEncryptionMobileDevicesJuiceJackingOktaBackdoorWorm8CharacterPasswordsDarkwebAwarenessTrainingRansomwareBreachSoftwareupdatesIntrusionWhalephishingCompromiselockscreenVirusMulti-factorauthentication(MFA)VulnerabilityExploitMalwareSecurityAssessmentZero-daySpearphishingEncryptionMobileDevicesJuiceJackingOktaBackdoorWorm8CharacterPasswordsDarkwebAwarenessTrainingRansomwareBreachSoftwareupdatesIntrusionWhalephishingCompromiselockscreen

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Virus
  2. Multi-factor authentication (MFA)
  3. Vulnerability
  4. Exploit
  5. Malware
  6. Security Assessment
  7. Zero-day
  8. Spear phishing
  9. Encryption
  10. Mobile Devices
  11. Juice Jacking
  12. Okta
  13. Backdoor
  14. Worm
  15. 8 Character Passwords
  16. Dark web
  17. Awareness Training
  18. Ransomware
  19. Breach
  20. Software updates
  21. Intrusion
  22. Whale phishing
  23. Compromise
  24. lock screen