Man inthemiddlePentestingPharmingEncryptionPasswordsPoliciesCyberattackRansomwareattackGreyhathackerDecryptionMalwareCloudstorageFinancialgainSocialengineeringPhishingBlackhathackerDenialofserviceSoftware/interfacedesignDisruptionAnti-virusIndustrialespionageUnauthorisedaccessDisasterrecoveryBiometricsCloudcomputingFirewallShouldersurfingExternalthreatsModernteamsWhitehathackerDowntimeBackupandrecovery2FABYODDevicehardeningInternalthreatsMan inthemiddlePentestingPharmingEncryptionPasswordsPoliciesCyberattackRansomwareattackGreyhathackerDecryptionMalwareCloudstorageFinancialgainSocialengineeringPhishingBlackhathackerDenialofserviceSoftware/interfacedesignDisruptionAnti-virusIndustrialespionageUnauthorisedaccessDisasterrecoveryBiometricsCloudcomputingFirewallShouldersurfingExternalthreatsModernteamsWhitehathackerDowntimeBackupandrecovery2FABYODDevicehardeningInternalthreats

Definition Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Man in the middle
  2. Pen testing
  3. Pharming
  4. Encryption
  5. Passwords
  6. Policies
  7. Cyber attack
  8. Ransomware attack
  9. Grey hat hacker
  10. Decryption
  11. Malware
  12. Cloud storage
  13. Financial gain
  14. Social engineering
  15. Phishing
  16. Black hat hacker
  17. Denial of service
  18. Software/interface design
  19. Disruption
  20. Anti-virus
  21. Industrial espionage
  22. Unauthorised access
  23. Disaster recovery
  24. Biometrics
  25. Cloud computing
  26. Firewall
  27. Shoulder surfing
  28. External threats
  29. Modern teams
  30. White hat hacker
  31. Downtime
  32. Backup and recovery
  33. 2FA
  34. BYOD
  35. Device hardening
  36. Internal threats