BlockchainA digital ledgerthat is secureand sharedacross multipleusers.MalwareMalicioussoftwaredesigned toharm or stealdata from acomputerEncryptionThe processof convertingdata into asecret codeto protect it.SecureProtectedfrom threatsorunauthorizedaccess.SpywareSoftware thatsecretly collectsinformationfrom yourdevice.IPaddressA uniquenumber thatidentifies adevice on anetwork.SpamUnwantedor junkemailsCyberattackAn attempt todamage oraccess acomputersystem ornetwork.HackerA person whobreaks intocomputersystems,often illegallyBackupA copy ofdata saved incase theoriginal is lostor damagedUpdateA new versionof softwarethat improvessecurity orperformance.CookieA small filestored on yourbrowser thattracks websiteactivityCyberlawLaws thatgovernonlinebehavior anddigital rights.CredentialsLogininformation likeusernamesandpasswords.PhishingA scam wherefake emails ormessages trickpeople intogiving personalinfoDataleakWhen privateinformation isaccidentallyexposed orstolenBlockchainA digital ledgerthat is secureand sharedacross multipleusers.MalwareMalicioussoftwaredesigned toharm or stealdata from acomputerEncryptionThe processof convertingdata into asecret codeto protect it.SecureProtectedfrom threatsorunauthorizedaccess.SpywareSoftware thatsecretly collectsinformationfrom yourdevice.IPaddressA uniquenumber thatidentifies adevice on anetwork.SpamUnwantedor junkemailsCyberattackAn attempt todamage oraccess acomputersystem ornetwork.HackerA person whobreaks intocomputersystems,often illegallyBackupA copy ofdata saved incase theoriginal is lostor damagedUpdateA new versionof softwarethat improvessecurity orperformance.CookieA small filestored on yourbrowser thattracks websiteactivityCyberlawLaws thatgovernonlinebehavior anddigital rights.CredentialsLogininformation likeusernamesandpasswords.PhishingA scam wherefake emails ormessages trickpeople intogiving personalinfoDataleakWhen privateinformation isaccidentallyexposed orstolen

CYBERSECURITY BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. A digital ledger that is secure and shared across multiple users.
    Blockchain
  2. Malicious software designed to harm or steal data from a computer
    Malware
  3. The process of converting data into a secret code to protect it.
    Encryption
  4. Protected from threats or unauthorized access.
    Secure
  5. Software that secretly collects information from your device.
    Spyware
  6. A unique number that identifies a device on a network.
    IP address
  7. Unwanted or junk emails
    Spam
  8. An attempt to damage or access a computer system or network.
    Cyberattack
  9. A person who breaks into computer systems, often illegally
    Hacker
  10. A copy of data saved in case the original is lost or damaged
    Backup
  11. A new version of software that improves security or performance.
    Update
  12. A small file stored on your browser that tracks website activity
    Cookie
  13. Laws that govern online behavior and digital rights.
    Cyberlaw
  14. Login information like usernames and passwords.
    Credentials
  15. A scam where fake emails or messages trick people into giving personal info
    Phishing
  16. When private information is accidentally exposed or stolen
    Data leak