VirusSecuritybreachPatchFirewallCyberbullying2FAKeyloggerPIIDenial ofService(DOS)RootkitVulnerabilityExploitZero-dayexploitITSecurityProgramMFAHackerPhishingSpamPenetrationtestingDataPrivacyTrojanEncryptionCyberintelligenceCybersecurityinsuranceCybersecurityawarenessRansomwareIdentitytheftCrowdstrikeSecuritypostureVPNBackdoorNetworkmonitoringMan-in-the-middleattackPasswordIncidentresponseDigitalCertificateVirusSecuritybreachPatchFirewallCyberbullying2FAKeyloggerPIIDenial ofService(DOS)RootkitVulnerabilityExploitZero-dayexploitITSecurityProgramMFAHackerPhishingSpamPenetrationtestingDataPrivacyTrojanEncryptionCyberintelligenceCybersecurityinsuranceCybersecurityawarenessRansomwareIdentitytheftCrowdstrikeSecuritypostureVPNBackdoorNetworkmonitoringMan-in-the-middleattackPasswordIncidentresponseDigitalCertificate

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Virus
  2. Security breach
  3. Patch
  4. Firewall
  5. Cyberbullying
  6. 2FA
  7. Keylogger
  8. PII
  9. Denial of Service (DOS)
  10. Rootkit
  11. Vulnerability
  12. Exploit
  13. Zero-day exploit
  14. IT Security Program
  15. MFA
  16. Hacker
  17. Phishing
  18. Spam
  19. Penetration testing
  20. Data Privacy
  21. Trojan
  22. Encryption
  23. Cyber intelligence
  24. Cybersecurity insurance
  25. Cybersecurity awareness
  26. Ransomware
  27. Identity theft
  28. Crowdstrike
  29. Security posture
  30. VPN
  31. Backdoor
  32. Network monitoring
  33. Man-in-the-middle attack
  34. Password
  35. Incident response
  36. Digital Certificate