BlackhathackerCloudcomputingUnauthorisedaccessWhitehathackerGreyhathackerBackupandrecoveryAnti-virusRansomwareattackPasswordsCloudstorageCyberattackBiometrics2FAMan inthemiddleFinancialgainPhishingModernteamsPoliciesMalwareIndustrialespionageInternalthreatsFirewallDecryptionExternalthreatsShouldersurfingPentestingSoftware/interfacedesignEncryptionDenialofserviceDisasterrecoveryPharmingSocialengineeringDowntimeDevicehardeningBYODDisruptionBlackhathackerCloudcomputingUnauthorisedaccessWhitehathackerGreyhathackerBackupandrecoveryAnti-virusRansomwareattackPasswordsCloudstorageCyberattackBiometrics2FAMan inthemiddleFinancialgainPhishingModernteamsPoliciesMalwareIndustrialespionageInternalthreatsFirewallDecryptionExternalthreatsShouldersurfingPentestingSoftware/interfacedesignEncryptionDenialofserviceDisasterrecoveryPharmingSocialengineeringDowntimeDevicehardeningBYODDisruption

Definition Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Black hat hacker
  2. Cloud computing
  3. Unauthorised access
  4. White hat hacker
  5. Grey hat hacker
  6. Backup and recovery
  7. Anti-virus
  8. Ransomware attack
  9. Passwords
  10. Cloud storage
  11. Cyber attack
  12. Biometrics
  13. 2FA
  14. Man in the middle
  15. Financial gain
  16. Phishing
  17. Modern teams
  18. Policies
  19. Malware
  20. Industrial espionage
  21. Internal threats
  22. Firewall
  23. Decryption
  24. External threats
  25. Shoulder surfing
  26. Pen testing
  27. Software/interface design
  28. Encryption
  29. Denial of service
  30. Disaster recovery
  31. Pharming
  32. Social engineering
  33. Downtime
  34. Device hardening
  35. BYOD
  36. Disruption