BackdoorITSecurityProgramIncidentresponseHackerSecuritypostureVirusNetworkmonitoringVPNDenial ofService(DOS)MFAMan-in-the-middleattackKeyloggerPasswordCybersecurityinsurancePatchFirewallDigitalCertificatePhishingCyberintelligenceDataPrivacy2FACyberbullyingVulnerabilityTrojanCrowdstrikePIIIdentitytheftRootkitExploitSecuritybreachEncryptionSpamRansomwareZero-dayexploitPenetrationtestingCybersecurityawarenessBackdoorITSecurityProgramIncidentresponseHackerSecuritypostureVirusNetworkmonitoringVPNDenial ofService(DOS)MFAMan-in-the-middleattackKeyloggerPasswordCybersecurityinsurancePatchFirewallDigitalCertificatePhishingCyberintelligenceDataPrivacy2FACyberbullyingVulnerabilityTrojanCrowdstrikePIIIdentitytheftRootkitExploitSecuritybreachEncryptionSpamRansomwareZero-dayexploitPenetrationtestingCybersecurityawareness

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Backdoor
  2. IT Security Program
  3. Incident response
  4. Hacker
  5. Security posture
  6. Virus
  7. Network monitoring
  8. VPN
  9. Denial of Service (DOS)
  10. MFA
  11. Man-in-the-middle attack
  12. Keylogger
  13. Password
  14. Cybersecurity insurance
  15. Patch
  16. Firewall
  17. Digital Certificate
  18. Phishing
  19. Cyber intelligence
  20. Data Privacy
  21. 2FA
  22. Cyberbullying
  23. Vulnerability
  24. Trojan
  25. Crowdstrike
  26. PII
  27. Identity theft
  28. Rootkit
  29. Exploit
  30. Security breach
  31. Encryption
  32. Spam
  33. Ransomware
  34. Zero-day exploit
  35. Penetration testing
  36. Cybersecurity awareness