Anti-virusPentestingBYODDowntimeDisruptionPharmingCloudcomputingBiometricsMan inthemiddleCloudstoragePhishingMalwareFirewallInternalthreatsDevicehardeningDecryptionIndustrialespionageCyberattackModernteamsPasswordsFinancialgainShouldersurfingBackupandrecoveryBlackhathackerUnauthorisedaccessGreyhathackerSocialengineeringSoftware/interfacedesignPoliciesEncryptionDenialofservice2FARansomwareattackWhitehathackerDisasterrecoveryExternalthreatsAnti-virusPentestingBYODDowntimeDisruptionPharmingCloudcomputingBiometricsMan inthemiddleCloudstoragePhishingMalwareFirewallInternalthreatsDevicehardeningDecryptionIndustrialespionageCyberattackModernteamsPasswordsFinancialgainShouldersurfingBackupandrecoveryBlackhathackerUnauthorisedaccessGreyhathackerSocialengineeringSoftware/interfacedesignPoliciesEncryptionDenialofservice2FARansomwareattackWhitehathackerDisasterrecoveryExternalthreats

Definition Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Anti-virus
  2. Pen testing
  3. BYOD
  4. Downtime
  5. Disruption
  6. Pharming
  7. Cloud computing
  8. Biometrics
  9. Man in the middle
  10. Cloud storage
  11. Phishing
  12. Malware
  13. Firewall
  14. Internal threats
  15. Device hardening
  16. Decryption
  17. Industrial espionage
  18. Cyber attack
  19. Modern teams
  20. Passwords
  21. Financial gain
  22. Shoulder surfing
  23. Backup and recovery
  24. Black hat hacker
  25. Unauthorised access
  26. Grey hat hacker
  27. Social engineering
  28. Software/interface design
  29. Policies
  30. Encryption
  31. Denial of service
  32. 2FA
  33. Ransomware attack
  34. White hat hacker
  35. Disaster recovery
  36. External threats