FinancialgainPhishingMalwareShouldersurfingSocialengineeringGreyhathackerPasswordsMan inthemiddleCloudcomputingBlackhathackerDisruptionModernteamsBiometricsFirewallDevicehardeningEncryptionIndustrialespionageDenialofservicePharmingRansomwareattackBYODPoliciesSoftware/interfacedesign2FACyberattackDecryptionPentestingExternalthreatsDowntimeCloudstorageAnti-virusBackupandrecoveryUnauthorisedaccessDisasterrecoveryInternalthreatsWhitehathackerFinancialgainPhishingMalwareShouldersurfingSocialengineeringGreyhathackerPasswordsMan inthemiddleCloudcomputingBlackhathackerDisruptionModernteamsBiometricsFirewallDevicehardeningEncryptionIndustrialespionageDenialofservicePharmingRansomwareattackBYODPoliciesSoftware/interfacedesign2FACyberattackDecryptionPentestingExternalthreatsDowntimeCloudstorageAnti-virusBackupandrecoveryUnauthorisedaccessDisasterrecoveryInternalthreatsWhitehathacker

Definition Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Financial gain
  2. Phishing
  3. Malware
  4. Shoulder surfing
  5. Social engineering
  6. Grey hat hacker
  7. Passwords
  8. Man in the middle
  9. Cloud computing
  10. Black hat hacker
  11. Disruption
  12. Modern teams
  13. Biometrics
  14. Firewall
  15. Device hardening
  16. Encryption
  17. Industrial espionage
  18. Denial of service
  19. Pharming
  20. Ransomware attack
  21. BYOD
  22. Policies
  23. Software/interface design
  24. 2FA
  25. Cyber attack
  26. Decryption
  27. Pen testing
  28. External threats
  29. Downtime
  30. Cloud storage
  31. Anti-virus
  32. Backup and recovery
  33. Unauthorised access
  34. Disaster recovery
  35. Internal threats
  36. White hat hacker