WhitehathackerSoftware/interfacedesignBlackhathackerUnauthorisedaccessPasswordsDecryptionDenialofserviceGreyhathackerDisasterrecoveryCloudstorageModernteams2FAMan inthemiddleSocialengineeringCyberattackInternalthreatsFinancialgainDevicehardeningBiometricsEncryptionRansomwareattackMalwareDowntimePoliciesBYODBackupandrecoveryPharmingPhishingAnti-virusCloudcomputingExternalthreatsShouldersurfingIndustrialespionageFirewallDisruptionPentestingWhitehathackerSoftware/interfacedesignBlackhathackerUnauthorisedaccessPasswordsDecryptionDenialofserviceGreyhathackerDisasterrecoveryCloudstorageModernteams2FAMan inthemiddleSocialengineeringCyberattackInternalthreatsFinancialgainDevicehardeningBiometricsEncryptionRansomwareattackMalwareDowntimePoliciesBYODBackupandrecoveryPharmingPhishingAnti-virusCloudcomputingExternalthreatsShouldersurfingIndustrialespionageFirewallDisruptionPentesting

Definition Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. White hat hacker
  2. Software/interface design
  3. Black hat hacker
  4. Unauthorised access
  5. Passwords
  6. Decryption
  7. Denial of service
  8. Grey hat hacker
  9. Disaster recovery
  10. Cloud storage
  11. Modern teams
  12. 2FA
  13. Man in the middle
  14. Social engineering
  15. Cyber attack
  16. Internal threats
  17. Financial gain
  18. Device hardening
  19. Biometrics
  20. Encryption
  21. Ransomware attack
  22. Malware
  23. Downtime
  24. Policies
  25. BYOD
  26. Backup and recovery
  27. Pharming
  28. Phishing
  29. Anti-virus
  30. Cloud computing
  31. External threats
  32. Shoulder surfing
  33. Industrial espionage
  34. Firewall
  35. Disruption
  36. Pen testing