FinancialgainBiometricsPharmingRansomwareattackUnauthorisedaccessPoliciesPentestingDecryptionBackupandrecoveryDisasterrecoveryCloudstorageShouldersurfingFirewallCloudcomputingExternalthreats2FAIndustrialespionageWhitehathackerAnti-virusCyberattackGreyhathackerBlackhathackerMan inthemiddlePasswordsEncryptionPhishingDevicehardeningModernteamsMalwareDowntimeDisruptionSocialengineeringSoftware/interfacedesignDenialofserviceBYODInternalthreatsFinancialgainBiometricsPharmingRansomwareattackUnauthorisedaccessPoliciesPentestingDecryptionBackupandrecoveryDisasterrecoveryCloudstorageShouldersurfingFirewallCloudcomputingExternalthreats2FAIndustrialespionageWhitehathackerAnti-virusCyberattackGreyhathackerBlackhathackerMan inthemiddlePasswordsEncryptionPhishingDevicehardeningModernteamsMalwareDowntimeDisruptionSocialengineeringSoftware/interfacedesignDenialofserviceBYODInternalthreats

Definition Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Financial gain
  2. Biometrics
  3. Pharming
  4. Ransomware attack
  5. Unauthorised access
  6. Policies
  7. Pen testing
  8. Decryption
  9. Backup and recovery
  10. Disaster recovery
  11. Cloud storage
  12. Shoulder surfing
  13. Firewall
  14. Cloud computing
  15. External threats
  16. 2FA
  17. Industrial espionage
  18. White hat hacker
  19. Anti-virus
  20. Cyber attack
  21. Grey hat hacker
  22. Black hat hacker
  23. Man in the middle
  24. Passwords
  25. Encryption
  26. Phishing
  27. Device hardening
  28. Modern teams
  29. Malware
  30. Downtime
  31. Disruption
  32. Social engineering
  33. Software/interface design
  34. Denial of service
  35. BYOD
  36. Internal threats