Zero-dayOktaSoftwareupdatesEncryptionMalwareDarkwebJuiceJackingWormWhalephishingVirusCompromise8CharacterPasswordsAwarenessTrainingVulnerabilityMulti-factorauthentication(MFA)ExploitSpearphishingSecurityAssessmentRansomwareMobileDeviceslockscreenBreachBackdoorIntrusionZero-dayOktaSoftwareupdatesEncryptionMalwareDarkwebJuiceJackingWormWhalephishingVirusCompromise8CharacterPasswordsAwarenessTrainingVulnerabilityMulti-factorauthentication(MFA)ExploitSpearphishingSecurityAssessmentRansomwareMobileDeviceslockscreenBreachBackdoorIntrusion

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Zero-day
  2. Okta
  3. Software updates
  4. Encryption
  5. Malware
  6. Dark web
  7. Juice Jacking
  8. Worm
  9. Whale phishing
  10. Virus
  11. Compromise
  12. 8 Character Passwords
  13. Awareness Training
  14. Vulnerability
  15. Multi-factor authentication (MFA)
  16. Exploit
  17. Spear phishing
  18. Security Assessment
  19. Ransomware
  20. Mobile Devices
  21. lock screen
  22. Breach
  23. Backdoor
  24. Intrusion