FirewallUnauthorisedaccess2FAExternalthreatsSoftware/interfacedesignModernteamsEncryptionBackupandrecoveryAnti-virusBYODPasswordsDevicehardeningFinancialgainWhitehathackerPharmingRansomwareattackGreyhathackerPoliciesDisasterrecoveryInternalthreatsIndustrialespionagePentestingDenialofserviceCyberattackSocialengineeringMan inthemiddleCloudstoragePhishingCloudcomputingShouldersurfingDowntimeBlackhathackerDisruptionDecryptionMalwareBiometricsFirewallUnauthorisedaccess2FAExternalthreatsSoftware/interfacedesignModernteamsEncryptionBackupandrecoveryAnti-virusBYODPasswordsDevicehardeningFinancialgainWhitehathackerPharmingRansomwareattackGreyhathackerPoliciesDisasterrecoveryInternalthreatsIndustrialespionagePentestingDenialofserviceCyberattackSocialengineeringMan inthemiddleCloudstoragePhishingCloudcomputingShouldersurfingDowntimeBlackhathackerDisruptionDecryptionMalwareBiometrics

Definition Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Firewall
  2. Unauthorised access
  3. 2FA
  4. External threats
  5. Software/interface design
  6. Modern teams
  7. Encryption
  8. Backup and recovery
  9. Anti-virus
  10. BYOD
  11. Passwords
  12. Device hardening
  13. Financial gain
  14. White hat hacker
  15. Pharming
  16. Ransomware attack
  17. Grey hat hacker
  18. Policies
  19. Disaster recovery
  20. Internal threats
  21. Industrial espionage
  22. Pen testing
  23. Denial of service
  24. Cyber attack
  25. Social engineering
  26. Man in the middle
  27. Cloud storage
  28. Phishing
  29. Cloud computing
  30. Shoulder surfing
  31. Downtime
  32. Black hat hacker
  33. Disruption
  34. Decryption
  35. Malware
  36. Biometrics