CyberlawLaws thatgovernonlinebehavior anddigital rights.SpamUnwantedor junkemailsPhishingA scam wherefake emails ormessages trickpeople intogiving personalinfoEncryptionThe processof convertingdata into asecret codeto protect it.CredentialsLogininformation likeusernamesandpasswords.SpywareSoftware thatsecretly collectsinformationfrom yourdevice.MalwareMalicioussoftwaredesigned toharm or stealdata from acomputerSecureProtectedfrom threatsorunauthorizedaccess.BackupA copy ofdata saved incase theoriginal is lostor damagedCyberattackAn attempt todamage oraccess acomputersystem ornetwork.BlockchainA digital ledgerthat is secureand sharedacross multipleusers.DataleakWhen privateinformation isaccidentallyexposed orstolenUpdateA new versionof softwarethat improvessecurity orperformance.CookieA small filestored on yourbrowser thattracks websiteactivityHackerA person whobreaks intocomputersystems,often illegallyIPaddressA uniquenumber thatidentifies adevice on anetwork.CyberlawLaws thatgovernonlinebehavior anddigital rights.SpamUnwantedor junkemailsPhishingA scam wherefake emails ormessages trickpeople intogiving personalinfoEncryptionThe processof convertingdata into asecret codeto protect it.CredentialsLogininformation likeusernamesandpasswords.SpywareSoftware thatsecretly collectsinformationfrom yourdevice.MalwareMalicioussoftwaredesigned toharm or stealdata from acomputerSecureProtectedfrom threatsorunauthorizedaccess.BackupA copy ofdata saved incase theoriginal is lostor damagedCyberattackAn attempt todamage oraccess acomputersystem ornetwork.BlockchainA digital ledgerthat is secureand sharedacross multipleusers.DataleakWhen privateinformation isaccidentallyexposed orstolenUpdateA new versionof softwarethat improvessecurity orperformance.CookieA small filestored on yourbrowser thattracks websiteactivityHackerA person whobreaks intocomputersystems,often illegallyIPaddressA uniquenumber thatidentifies adevice on anetwork.

CYBERSECURITY BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Laws that govern online behavior and digital rights.
    Cyberlaw
  2. Unwanted or junk emails
    Spam
  3. A scam where fake emails or messages trick people into giving personal info
    Phishing
  4. The process of converting data into a secret code to protect it.
    Encryption
  5. Login information like usernames and passwords.
    Credentials
  6. Software that secretly collects information from your device.
    Spyware
  7. Malicious software designed to harm or steal data from a computer
    Malware
  8. Protected from threats or unauthorized access.
    Secure
  9. A copy of data saved in case the original is lost or damaged
    Backup
  10. An attempt to damage or access a computer system or network.
    Cyberattack
  11. A digital ledger that is secure and shared across multiple users.
    Blockchain
  12. When private information is accidentally exposed or stolen
    Data leak
  13. A new version of software that improves security or performance.
    Update
  14. A small file stored on your browser that tracks website activity
    Cookie
  15. A person who breaks into computer systems, often illegally
    Hacker
  16. A unique number that identifies a device on a network.
    IP address