ModernteamsDenialofserviceMalwareEncryptionCyberattackDisasterrecoveryDowntimeAnti-virusExternalthreatsDisruptionMan inthemiddleDecryptionWhitehathackerPentestingBackupandrecoveryFinancialgainGreyhathackerPharmingSoftware/interfacedesignPhishingCloudstoragePoliciesDevicehardeningBlackhathackerBiometricsBYODUnauthorisedaccessPasswordsFirewall2FAInternalthreatsShouldersurfingRansomwareattackIndustrialespionageSocialengineeringCloudcomputingModernteamsDenialofserviceMalwareEncryptionCyberattackDisasterrecoveryDowntimeAnti-virusExternalthreatsDisruptionMan inthemiddleDecryptionWhitehathackerPentestingBackupandrecoveryFinancialgainGreyhathackerPharmingSoftware/interfacedesignPhishingCloudstoragePoliciesDevicehardeningBlackhathackerBiometricsBYODUnauthorisedaccessPasswordsFirewall2FAInternalthreatsShouldersurfingRansomwareattackIndustrialespionageSocialengineeringCloudcomputing

Definition Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Modern teams
  2. Denial of service
  3. Malware
  4. Encryption
  5. Cyber attack
  6. Disaster recovery
  7. Downtime
  8. Anti-virus
  9. External threats
  10. Disruption
  11. Man in the middle
  12. Decryption
  13. White hat hacker
  14. Pen testing
  15. Backup and recovery
  16. Financial gain
  17. Grey hat hacker
  18. Pharming
  19. Software/interface design
  20. Phishing
  21. Cloud storage
  22. Policies
  23. Device hardening
  24. Black hat hacker
  25. Biometrics
  26. BYOD
  27. Unauthorised access
  28. Passwords
  29. Firewall
  30. 2FA
  31. Internal threats
  32. Shoulder surfing
  33. Ransomware attack
  34. Industrial espionage
  35. Social engineering
  36. Cloud computing