NetworkmonitoringTrojanDenial ofService(DOS)Zero-dayexploitSpamPenetrationtestingSecuritybreachCyberbullyingPhishingPatchCyberintelligenceEncryptionMFAVPNVulnerabilityPIIKeyloggerSecuritypostureBackdoorDigitalCertificateCybersecurityinsurance2FAMan-in-the-middleattackVirusCybersecurityawarenessIdentitytheftDataPrivacyExploitFirewallCrowdstrikeHackerRootkitRansomwareITSecurityProgramIncidentresponsePasswordNetworkmonitoringTrojanDenial ofService(DOS)Zero-dayexploitSpamPenetrationtestingSecuritybreachCyberbullyingPhishingPatchCyberintelligenceEncryptionMFAVPNVulnerabilityPIIKeyloggerSecuritypostureBackdoorDigitalCertificateCybersecurityinsurance2FAMan-in-the-middleattackVirusCybersecurityawarenessIdentitytheftDataPrivacyExploitFirewallCrowdstrikeHackerRootkitRansomwareITSecurityProgramIncidentresponsePassword

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Network monitoring
  2. Trojan
  3. Denial of Service (DOS)
  4. Zero-day exploit
  5. Spam
  6. Penetration testing
  7. Security breach
  8. Cyberbullying
  9. Phishing
  10. Patch
  11. Cyber intelligence
  12. Encryption
  13. MFA
  14. VPN
  15. Vulnerability
  16. PII
  17. Keylogger
  18. Security posture
  19. Backdoor
  20. Digital Certificate
  21. Cybersecurity insurance
  22. 2FA
  23. Man-in-the-middle attack
  24. Virus
  25. Cybersecurity awareness
  26. Identity theft
  27. Data Privacy
  28. Exploit
  29. Firewall
  30. Crowdstrike
  31. Hacker
  32. Rootkit
  33. Ransomware
  34. IT Security Program
  35. Incident response
  36. Password