PhishingA scam wherefake emails ormessages trickpeople intogiving personalinfoSpywareSoftware thatsecretly collectsinformationfrom yourdevice.SpamUnwantedor junkemailsEncryptionThe processof convertingdata into asecret codeto protect it.DataleakWhen privateinformation isaccidentallyexposed orstolenCyberlawLaws thatgovernonlinebehavior anddigital rights.MalwareMalicioussoftwaredesigned toharm or stealdata from acomputerCookieA small filestored on yourbrowser thattracks websiteactivitySecureProtectedfrom threatsorunauthorizedaccess.BackupA copy ofdata saved incase theoriginal is lostor damagedCredentialsLogininformation likeusernamesandpasswords.HackerA person whobreaks intocomputersystems,often illegallyBlockchainA digital ledgerthat is secureand sharedacross multipleusers.CyberattackAn attempt todamage oraccess acomputersystem ornetwork.IPaddressA uniquenumber thatidentifies adevice on anetwork.UpdateA new versionof softwarethat improvessecurity orperformance.PhishingA scam wherefake emails ormessages trickpeople intogiving personalinfoSpywareSoftware thatsecretly collectsinformationfrom yourdevice.SpamUnwantedor junkemailsEncryptionThe processof convertingdata into asecret codeto protect it.DataleakWhen privateinformation isaccidentallyexposed orstolenCyberlawLaws thatgovernonlinebehavior anddigital rights.MalwareMalicioussoftwaredesigned toharm or stealdata from acomputerCookieA small filestored on yourbrowser thattracks websiteactivitySecureProtectedfrom threatsorunauthorizedaccess.BackupA copy ofdata saved incase theoriginal is lostor damagedCredentialsLogininformation likeusernamesandpasswords.HackerA person whobreaks intocomputersystems,often illegallyBlockchainA digital ledgerthat is secureand sharedacross multipleusers.CyberattackAn attempt todamage oraccess acomputersystem ornetwork.IPaddressA uniquenumber thatidentifies adevice on anetwork.UpdateA new versionof softwarethat improvessecurity orperformance.

CYBERSECURITY BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. A scam where fake emails or messages trick people into giving personal info
    Phishing
  2. Software that secretly collects information from your device.
    Spyware
  3. Unwanted or junk emails
    Spam
  4. The process of converting data into a secret code to protect it.
    Encryption
  5. When private information is accidentally exposed or stolen
    Data leak
  6. Laws that govern online behavior and digital rights.
    Cyberlaw
  7. Malicious software designed to harm or steal data from a computer
    Malware
  8. A small file stored on your browser that tracks website activity
    Cookie
  9. Protected from threats or unauthorized access.
    Secure
  10. A copy of data saved in case the original is lost or damaged
    Backup
  11. Login information like usernames and passwords.
    Credentials
  12. A person who breaks into computer systems, often illegally
    Hacker
  13. A digital ledger that is secure and shared across multiple users.
    Blockchain
  14. An attempt to damage or access a computer system or network.
    Cyberattack
  15. A unique number that identifies a device on a network.
    IP address
  16. A new version of software that improves security or performance.
    Update