CyberattackEncryptionPhishingFinancialgainDowntimeBYODBiometricsDecryptionPentestingGreyhathackerUnauthorisedaccessSocialengineeringInternalthreatsPharmingShouldersurfingDevicehardeningPasswordsCloudcomputingFirewallMan inthemiddleBackupandrecoveryPoliciesModernteamsExternalthreatsBlackhathackerWhitehathackerDisruptionDenialofserviceSoftware/interfacedesignRansomwareattackMalwareAnti-virus2FADisasterrecoveryCloudstorageIndustrialespionageCyberattackEncryptionPhishingFinancialgainDowntimeBYODBiometricsDecryptionPentestingGreyhathackerUnauthorisedaccessSocialengineeringInternalthreatsPharmingShouldersurfingDevicehardeningPasswordsCloudcomputingFirewallMan inthemiddleBackupandrecoveryPoliciesModernteamsExternalthreatsBlackhathackerWhitehathackerDisruptionDenialofserviceSoftware/interfacedesignRansomwareattackMalwareAnti-virus2FADisasterrecoveryCloudstorageIndustrialespionage

Definition Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Cyber attack
  2. Encryption
  3. Phishing
  4. Financial gain
  5. Downtime
  6. BYOD
  7. Biometrics
  8. Decryption
  9. Pen testing
  10. Grey hat hacker
  11. Unauthorised access
  12. Social engineering
  13. Internal threats
  14. Pharming
  15. Shoulder surfing
  16. Device hardening
  17. Passwords
  18. Cloud computing
  19. Firewall
  20. Man in the middle
  21. Backup and recovery
  22. Policies
  23. Modern teams
  24. External threats
  25. Black hat hacker
  26. White hat hacker
  27. Disruption
  28. Denial of service
  29. Software/interface design
  30. Ransomware attack
  31. Malware
  32. Anti-virus
  33. 2FA
  34. Disaster recovery
  35. Cloud storage
  36. Industrial espionage