SocialengineeringDecryptionEncryptionPharmingCloudstorageExternalthreatsCyberattackBackupandrecoveryMalwareWhitehathackerBlackhathackerGreyhathackerMan inthemiddleAnti-virusDenialofserviceIndustrialespionage2FAPasswordsShouldersurfingUnauthorisedaccessBiometricsDisruptionDisasterrecoveryDevicehardeningInternalthreatsRansomwareattackPhishingFirewallPoliciesSoftware/interfacedesignModernteamsFinancialgainBYODDowntimeCloudcomputingPentestingSocialengineeringDecryptionEncryptionPharmingCloudstorageExternalthreatsCyberattackBackupandrecoveryMalwareWhitehathackerBlackhathackerGreyhathackerMan inthemiddleAnti-virusDenialofserviceIndustrialespionage2FAPasswordsShouldersurfingUnauthorisedaccessBiometricsDisruptionDisasterrecoveryDevicehardeningInternalthreatsRansomwareattackPhishingFirewallPoliciesSoftware/interfacedesignModernteamsFinancialgainBYODDowntimeCloudcomputingPentesting

Definition Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Social engineering
  2. Decryption
  3. Encryption
  4. Pharming
  5. Cloud storage
  6. External threats
  7. Cyber attack
  8. Backup and recovery
  9. Malware
  10. White hat hacker
  11. Black hat hacker
  12. Grey hat hacker
  13. Man in the middle
  14. Anti-virus
  15. Denial of service
  16. Industrial espionage
  17. 2FA
  18. Passwords
  19. Shoulder surfing
  20. Unauthorised access
  21. Biometrics
  22. Disruption
  23. Disaster recovery
  24. Device hardening
  25. Internal threats
  26. Ransomware attack
  27. Phishing
  28. Firewall
  29. Policies
  30. Software/interface design
  31. Modern teams
  32. Financial gain
  33. BYOD
  34. Downtime
  35. Cloud computing
  36. Pen testing