Virus2FADataPrivacyDenial ofService(DOS)VPNExploitSecuritybreachCyberintelligencePIIVulnerabilityTrojanHackerIdentitytheftEncryptionSpamPasswordPhishingNetworkmonitoringPatchDigitalCertificatePenetrationtestingFirewallRootkitKeyloggerIncidentresponseMan-in-the-middleattackITSecurityProgramRansomwareSecuritypostureMFACybersecurityinsuranceCyberbullyingCybersecurityawarenessCrowdstrikeBackdoorZero-dayexploitVirus2FADataPrivacyDenial ofService(DOS)VPNExploitSecuritybreachCyberintelligencePIIVulnerabilityTrojanHackerIdentitytheftEncryptionSpamPasswordPhishingNetworkmonitoringPatchDigitalCertificatePenetrationtestingFirewallRootkitKeyloggerIncidentresponseMan-in-the-middleattackITSecurityProgramRansomwareSecuritypostureMFACybersecurityinsuranceCyberbullyingCybersecurityawarenessCrowdstrikeBackdoorZero-dayexploit

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Virus
  2. 2FA
  3. Data Privacy
  4. Denial of Service (DOS)
  5. VPN
  6. Exploit
  7. Security breach
  8. Cyber intelligence
  9. PII
  10. Vulnerability
  11. Trojan
  12. Hacker
  13. Identity theft
  14. Encryption
  15. Spam
  16. Password
  17. Phishing
  18. Network monitoring
  19. Patch
  20. Digital Certificate
  21. Penetration testing
  22. Firewall
  23. Rootkit
  24. Keylogger
  25. Incident response
  26. Man-in-the-middle attack
  27. IT Security Program
  28. Ransomware
  29. Security posture
  30. MFA
  31. Cybersecurity insurance
  32. Cyberbullying
  33. Cybersecurity awareness
  34. Crowdstrike
  35. Backdoor
  36. Zero-day exploit