Anti-virusInternalthreatsShouldersurfingCloudstorageBackupandrecovery2FAMalwareSoftware/interfacedesignBYODDowntimeWhitehathackerDevicehardeningRansomwareattackModernteamsUnauthorisedaccessPasswordsSocialengineeringFirewallDisasterrecoveryDenialofservicePentestingDisruptionIndustrialespionagePharmingEncryptionMan inthemiddleBlackhathackerBiometricsDecryptionCloudcomputingCyberattackExternalthreatsPhishingGreyhathackerFinancialgainPoliciesAnti-virusInternalthreatsShouldersurfingCloudstorageBackupandrecovery2FAMalwareSoftware/interfacedesignBYODDowntimeWhitehathackerDevicehardeningRansomwareattackModernteamsUnauthorisedaccessPasswordsSocialengineeringFirewallDisasterrecoveryDenialofservicePentestingDisruptionIndustrialespionagePharmingEncryptionMan inthemiddleBlackhathackerBiometricsDecryptionCloudcomputingCyberattackExternalthreatsPhishingGreyhathackerFinancialgainPolicies

Definition Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Anti-virus
  2. Internal threats
  3. Shoulder surfing
  4. Cloud storage
  5. Backup and recovery
  6. 2FA
  7. Malware
  8. Software/interface design
  9. BYOD
  10. Downtime
  11. White hat hacker
  12. Device hardening
  13. Ransomware attack
  14. Modern teams
  15. Unauthorised access
  16. Passwords
  17. Social engineering
  18. Firewall
  19. Disaster recovery
  20. Denial of service
  21. Pen testing
  22. Disruption
  23. Industrial espionage
  24. Pharming
  25. Encryption
  26. Man in the middle
  27. Black hat hacker
  28. Biometrics
  29. Decryption
  30. Cloud computing
  31. Cyber attack
  32. External threats
  33. Phishing
  34. Grey hat hacker
  35. Financial gain
  36. Policies