InternalthreatsModernteamsPentestingSoftware/interfacedesignGreyhathackerBYOD2FAAnti-virusWhitehathackerDisasterrecoveryEncryptionCyberattackFirewallDisruptionPhishingDecryptionDowntimeCloudcomputingBiometricsPasswordsDenialofserviceIndustrialespionageRansomwareattackBlackhathackerFinancialgainPoliciesMan inthemiddlePharmingBackupandrecoveryShouldersurfingCloudstorageMalwareUnauthorisedaccessSocialengineeringDevicehardeningExternalthreatsInternalthreatsModernteamsPentestingSoftware/interfacedesignGreyhathackerBYOD2FAAnti-virusWhitehathackerDisasterrecoveryEncryptionCyberattackFirewallDisruptionPhishingDecryptionDowntimeCloudcomputingBiometricsPasswordsDenialofserviceIndustrialespionageRansomwareattackBlackhathackerFinancialgainPoliciesMan inthemiddlePharmingBackupandrecoveryShouldersurfingCloudstorageMalwareUnauthorisedaccessSocialengineeringDevicehardeningExternalthreats

Definition Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Internal threats
  2. Modern teams
  3. Pen testing
  4. Software/interface design
  5. Grey hat hacker
  6. BYOD
  7. 2FA
  8. Anti-virus
  9. White hat hacker
  10. Disaster recovery
  11. Encryption
  12. Cyber attack
  13. Firewall
  14. Disruption
  15. Phishing
  16. Decryption
  17. Downtime
  18. Cloud computing
  19. Biometrics
  20. Passwords
  21. Denial of service
  22. Industrial espionage
  23. Ransomware attack
  24. Black hat hacker
  25. Financial gain
  26. Policies
  27. Man in the middle
  28. Pharming
  29. Backup and recovery
  30. Shoulder surfing
  31. Cloud storage
  32. Malware
  33. Unauthorised access
  34. Social engineering
  35. Device hardening
  36. External threats