SpearphishingVirus8CharacterPasswordsRansomwareCompromiseDarkweblockscreenVulnerabilityEncryptionSecurityAssessmentMobileDevicesIntrusionAwarenessTrainingWhalephishingOktaSoftwareupdatesBackdoorJuiceJackingMalwareExploitBreachMulti-factorauthentication(MFA)Zero-dayWormSpearphishingVirus8CharacterPasswordsRansomwareCompromiseDarkweblockscreenVulnerabilityEncryptionSecurityAssessmentMobileDevicesIntrusionAwarenessTrainingWhalephishingOktaSoftwareupdatesBackdoorJuiceJackingMalwareExploitBreachMulti-factorauthentication(MFA)Zero-dayWorm

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Spear phishing
  2. Virus
  3. 8 Character Passwords
  4. Ransomware
  5. Compromise
  6. Dark web
  7. lock screen
  8. Vulnerability
  9. Encryption
  10. Security Assessment
  11. Mobile Devices
  12. Intrusion
  13. Awareness Training
  14. Whale phishing
  15. Okta
  16. Software updates
  17. Backdoor
  18. Juice Jacking
  19. Malware
  20. Exploit
  21. Breach
  22. Multi-factor authentication (MFA)
  23. Zero-day
  24. Worm