This bingo card has 36 words: Cloud computing, Cloud storage, Modern teams, Industrial espionage, Financial gain, Disruption, Downtime, Cyber attack, Internal threats, External threats, Man in the middle, Unauthorised access, Malware, Denial of service, Phishing, Pharming, Social engineering, Shoulder surfing, BYOD, Ransomware attack, Firewall, Anti-virus, Software/interface design, Device hardening, Backup and recovery, Encryption, Decryption, Biometrics, Passwords, 2FA, Black hat hacker, Grey hat hacker, White hat hacker, Pen testing, Policies and Disaster recovery.
Definition Bingo! | Social Engineering and Hacker Bingo | BLOKWORX - 5 Shifts Bingo | IT Revision Bingo | Cybersecurity Terms Bingo
Share this URL with your players:
For more control of your online game, create a clone of this card first.
Learn how to conduct a bingo game.
With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.
Tip: If you want your game to last longer (on average), add more unique words/images to it.