Man inthemiddleDenialofserviceCyberattackFinancialgainPentestingBYODDowntimePoliciesShouldersurfingMalwareRansomwareattackBiometricsPasswordsFirewallWhitehathackerUnauthorisedaccessDisasterrecoveryGreyhathackerEncryptionAnti-virusDevicehardeningModernteamsPharmingPhishingIndustrialespionageDecryptionInternalthreatsBlackhathackerBackupandrecoverySocialengineeringCloudstorage2FASoftware/interfacedesignCloudcomputingExternalthreatsDisruptionMan inthemiddleDenialofserviceCyberattackFinancialgainPentestingBYODDowntimePoliciesShouldersurfingMalwareRansomwareattackBiometricsPasswordsFirewallWhitehathackerUnauthorisedaccessDisasterrecoveryGreyhathackerEncryptionAnti-virusDevicehardeningModernteamsPharmingPhishingIndustrialespionageDecryptionInternalthreatsBlackhathackerBackupandrecoverySocialengineeringCloudstorage2FASoftware/interfacedesignCloudcomputingExternalthreatsDisruption

Definition Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Man in the middle
  2. Denial of service
  3. Cyber attack
  4. Financial gain
  5. Pen testing
  6. BYOD
  7. Downtime
  8. Policies
  9. Shoulder surfing
  10. Malware
  11. Ransomware attack
  12. Biometrics
  13. Passwords
  14. Firewall
  15. White hat hacker
  16. Unauthorised access
  17. Disaster recovery
  18. Grey hat hacker
  19. Encryption
  20. Anti-virus
  21. Device hardening
  22. Modern teams
  23. Pharming
  24. Phishing
  25. Industrial espionage
  26. Decryption
  27. Internal threats
  28. Black hat hacker
  29. Backup and recovery
  30. Social engineering
  31. Cloud storage
  32. 2FA
  33. Software/interface design
  34. Cloud computing
  35. External threats
  36. Disruption