CloudstorageInternalthreatsFirewallMalwareEncryptionCyberattackPasswordsPentestingMan inthemiddlePhishingAnti-virusDevicehardeningFinancialgainWhitehathackerDenialofserviceIndustrialespionageBYODShouldersurfingBiometricsPharmingBackupandrecoveryDowntimeSoftware/interfacedesignCloudcomputingGreyhathackerRansomwareattack2FADisasterrecoveryUnauthorisedaccessBlackhathackerSocialengineeringModernteamsExternalthreatsDisruptionPoliciesDecryptionCloudstorageInternalthreatsFirewallMalwareEncryptionCyberattackPasswordsPentestingMan inthemiddlePhishingAnti-virusDevicehardeningFinancialgainWhitehathackerDenialofserviceIndustrialespionageBYODShouldersurfingBiometricsPharmingBackupandrecoveryDowntimeSoftware/interfacedesignCloudcomputingGreyhathackerRansomwareattack2FADisasterrecoveryUnauthorisedaccessBlackhathackerSocialengineeringModernteamsExternalthreatsDisruptionPoliciesDecryption

Definition Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Cloud storage
  2. Internal threats
  3. Firewall
  4. Malware
  5. Encryption
  6. Cyber attack
  7. Passwords
  8. Pen testing
  9. Man in the middle
  10. Phishing
  11. Anti-virus
  12. Device hardening
  13. Financial gain
  14. White hat hacker
  15. Denial of service
  16. Industrial espionage
  17. BYOD
  18. Shoulder surfing
  19. Biometrics
  20. Pharming
  21. Backup and recovery
  22. Downtime
  23. Software/interface design
  24. Cloud computing
  25. Grey hat hacker
  26. Ransomware attack
  27. 2FA
  28. Disaster recovery
  29. Unauthorised access
  30. Black hat hacker
  31. Social engineering
  32. Modern teams
  33. External threats
  34. Disruption
  35. Policies
  36. Decryption