Biometrics Denial of service Downtime Trojan Horse Infrastructure Social Engineering Open Wifi Network Tethering Disaster recovery Firewall Ad Hoc Network Cloud computing Personal Hotspot Anti virus software Internal threats Scalability Rural Pharming Backup and recovery Disruption Two factor authentication Public communication Traditional computing Working 24/7/365 Access Rights Remote working Bandwidth Device hardening Industrial espionage Cloud storage Stakeholders Ransomware Email Biometrics Denial of service Downtime Trojan Horse Infrastructure Social Engineering Open Wifi Network Tethering Disaster recovery Firewall Ad Hoc Network Cloud computing Personal Hotspot Anti virus software Internal threats Scalability Rural Pharming Backup and recovery Disruption Two factor authentication Public communication Traditional computing Working 24/7/365 Access Rights Remote working Bandwidth Device hardening Industrial espionage Cloud storage Stakeholders Ransomware Email
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Biometrics
Denial of service
Downtime
Trojan Horse
Infrastructure
Social Engineering
Open Wifi Network
Tethering
Disaster recovery
Firewall
Ad Hoc Network
Cloud computing
Personal Hotspot
Anti virus software
Internal threats
Scalability
Rural
Pharming
Backup and recovery
Disruption
Two factor authentication
Public communication
Traditional computing
Working 24/7/365
Access Rights
Remote working
Bandwidth
Device hardening
Industrial espionage
Cloud storage
Stakeholders
Ransomware
Email