SocialengineeringFinancialgain2FAMan inthemiddleModernteamsEncryptionExternalthreatsDisruptionBlackhathackerAnti-virusDisasterrecoveryPhishingCloudstorageGreyhathackerPentestingDevicehardeningDenialofserviceIndustrialespionageInternalthreatsPoliciesMalwarePasswordsDowntimeDecryptionUnauthorisedaccessCloudcomputingSoftware/interfacedesignBYODBiometricsBackupandrecoveryPharmingShouldersurfingWhitehathackerRansomwareattackFirewallCyberattackSocialengineeringFinancialgain2FAMan inthemiddleModernteamsEncryptionExternalthreatsDisruptionBlackhathackerAnti-virusDisasterrecoveryPhishingCloudstorageGreyhathackerPentestingDevicehardeningDenialofserviceIndustrialespionageInternalthreatsPoliciesMalwarePasswordsDowntimeDecryptionUnauthorisedaccessCloudcomputingSoftware/interfacedesignBYODBiometricsBackupandrecoveryPharmingShouldersurfingWhitehathackerRansomwareattackFirewallCyberattack

Definition Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Social engineering
  2. Financial gain
  3. 2FA
  4. Man in the middle
  5. Modern teams
  6. Encryption
  7. External threats
  8. Disruption
  9. Black hat hacker
  10. Anti-virus
  11. Disaster recovery
  12. Phishing
  13. Cloud storage
  14. Grey hat hacker
  15. Pen testing
  16. Device hardening
  17. Denial of service
  18. Industrial espionage
  19. Internal threats
  20. Policies
  21. Malware
  22. Passwords
  23. Downtime
  24. Decryption
  25. Unauthorised access
  26. Cloud computing
  27. Software/interface design
  28. BYOD
  29. Biometrics
  30. Backup and recovery
  31. Pharming
  32. Shoulder surfing
  33. White hat hacker
  34. Ransomware attack
  35. Firewall
  36. Cyber attack