SpywareSoftware thatsecretly collectsinformationfrom yourdevice.EncryptionThe processof convertingdata into asecret codeto protect it.CyberattackAn attempt todamage oraccess acomputersystem ornetwork.MalwareMalicioussoftwaredesigned toharm or stealdata from acomputerIPaddressA uniquenumber thatidentifies adevice on anetwork.BlockchainA digital ledgerthat is secureand sharedacross multipleusers.PhishingA scam wherefake emails ormessages trickpeople intogiving personalinfoCredentialsLogininformation likeusernamesandpasswords.BackupA copy ofdata saved incase theoriginal is lostor damagedDataleakWhen privateinformation isaccidentallyexposed orstolenHackerA person whobreaks intocomputersystems,often illegallySecureProtectedfrom threatsorunauthorizedaccess.SpamUnwantedor junkemailsCookieA small filestored on yourbrowser thattracks websiteactivityCyberlawLaws thatgovernonlinebehavior anddigital rights.UpdateA new versionof softwarethat improvessecurity orperformance.SpywareSoftware thatsecretly collectsinformationfrom yourdevice.EncryptionThe processof convertingdata into asecret codeto protect it.CyberattackAn attempt todamage oraccess acomputersystem ornetwork.MalwareMalicioussoftwaredesigned toharm or stealdata from acomputerIPaddressA uniquenumber thatidentifies adevice on anetwork.BlockchainA digital ledgerthat is secureand sharedacross multipleusers.PhishingA scam wherefake emails ormessages trickpeople intogiving personalinfoCredentialsLogininformation likeusernamesandpasswords.BackupA copy ofdata saved incase theoriginal is lostor damagedDataleakWhen privateinformation isaccidentallyexposed orstolenHackerA person whobreaks intocomputersystems,often illegallySecureProtectedfrom threatsorunauthorizedaccess.SpamUnwantedor junkemailsCookieA small filestored on yourbrowser thattracks websiteactivityCyberlawLaws thatgovernonlinebehavior anddigital rights.UpdateA new versionof softwarethat improvessecurity orperformance.

CYBERSECURITY BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Software that secretly collects information from your device.
    Spyware
  2. The process of converting data into a secret code to protect it.
    Encryption
  3. An attempt to damage or access a computer system or network.
    Cyberattack
  4. Malicious software designed to harm or steal data from a computer
    Malware
  5. A unique number that identifies a device on a network.
    IP address
  6. A digital ledger that is secure and shared across multiple users.
    Blockchain
  7. A scam where fake emails or messages trick people into giving personal info
    Phishing
  8. Login information like usernames and passwords.
    Credentials
  9. A copy of data saved in case the original is lost or damaged
    Backup
  10. When private information is accidentally exposed or stolen
    Data leak
  11. A person who breaks into computer systems, often illegally
    Hacker
  12. Protected from threats or unauthorized access.
    Secure
  13. Unwanted or junk emails
    Spam
  14. A small file stored on your browser that tracks website activity
    Cookie
  15. Laws that govern online behavior and digital rights.
    Cyberlaw
  16. A new version of software that improves security or performance.
    Update