Man inthemiddlePhishingSocialengineeringMalwareEncryptionInternalthreatsDenialofserviceRansomwareattackDevicehardeningModernteamsUnauthorisedaccessCloudcomputingPasswordsGreyhathackerExternalthreatsShouldersurfingBYODPharming2FAPentestingDowntimeDisasterrecoveryBackupandrecoveryDecryptionSoftware/interfacedesignAnti-virusFirewallPoliciesWhitehathackerCloudstorageDisruptionBiometricsCyberattackBlackhathackerFinancialgainIndustrialespionageMan inthemiddlePhishingSocialengineeringMalwareEncryptionInternalthreatsDenialofserviceRansomwareattackDevicehardeningModernteamsUnauthorisedaccessCloudcomputingPasswordsGreyhathackerExternalthreatsShouldersurfingBYODPharming2FAPentestingDowntimeDisasterrecoveryBackupandrecoveryDecryptionSoftware/interfacedesignAnti-virusFirewallPoliciesWhitehathackerCloudstorageDisruptionBiometricsCyberattackBlackhathackerFinancialgainIndustrialespionage

Definition Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Man in the middle
  2. Phishing
  3. Social engineering
  4. Malware
  5. Encryption
  6. Internal threats
  7. Denial of service
  8. Ransomware attack
  9. Device hardening
  10. Modern teams
  11. Unauthorised access
  12. Cloud computing
  13. Passwords
  14. Grey hat hacker
  15. External threats
  16. Shoulder surfing
  17. BYOD
  18. Pharming
  19. 2FA
  20. Pen testing
  21. Downtime
  22. Disaster recovery
  23. Backup and recovery
  24. Decryption
  25. Software/interface design
  26. Anti-virus
  27. Firewall
  28. Policies
  29. White hat hacker
  30. Cloud storage
  31. Disruption
  32. Biometrics
  33. Cyber attack
  34. Black hat hacker
  35. Financial gain
  36. Industrial espionage