Anti-virusCloudcomputingMan inthemiddleBlackhathackerInternalthreatsDisruptionPhishingDevicehardeningBackupandrecoveryDenialofserviceDowntimeModernteamsExternalthreatsCloudstorageSocialengineeringDisasterrecoveryFinancialgainGreyhathacker2FAPharmingPasswordsSoftware/interfacedesignEncryptionPentestingIndustrialespionageBiometricsPoliciesCyberattackFirewallShouldersurfingUnauthorisedaccessBYODRansomwareattackMalwareDecryptionWhitehathackerAnti-virusCloudcomputingMan inthemiddleBlackhathackerInternalthreatsDisruptionPhishingDevicehardeningBackupandrecoveryDenialofserviceDowntimeModernteamsExternalthreatsCloudstorageSocialengineeringDisasterrecoveryFinancialgainGreyhathacker2FAPharmingPasswordsSoftware/interfacedesignEncryptionPentestingIndustrialespionageBiometricsPoliciesCyberattackFirewallShouldersurfingUnauthorisedaccessBYODRansomwareattackMalwareDecryptionWhitehathacker

Definition Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Anti-virus
  2. Cloud computing
  3. Man in the middle
  4. Black hat hacker
  5. Internal threats
  6. Disruption
  7. Phishing
  8. Device hardening
  9. Backup and recovery
  10. Denial of service
  11. Downtime
  12. Modern teams
  13. External threats
  14. Cloud storage
  15. Social engineering
  16. Disaster recovery
  17. Financial gain
  18. Grey hat hacker
  19. 2FA
  20. Pharming
  21. Passwords
  22. Software/interface design
  23. Encryption
  24. Pen testing
  25. Industrial espionage
  26. Biometrics
  27. Policies
  28. Cyber attack
  29. Firewall
  30. Shoulder surfing
  31. Unauthorised access
  32. BYOD
  33. Ransomware attack
  34. Malware
  35. Decryption
  36. White hat hacker