Traditional computing Disaster recovery Rural Biometrics Email Bandwidth Denial of service Access Rights Tethering Anti virus software Working 24/7/365 Cloud storage Pharming Backup and recovery Public communication Scalability Cloud computing Ad Hoc Network Firewall Industrial espionage Device hardening Infrastructure Open Wifi Network Downtime Ransomware Disruption Internal threats Personal Hotspot Remote working Two factor authentication Trojan Horse Social Engineering Stakeholders Traditional computing Disaster recovery Rural Biometrics Email Bandwidth Denial of service Access Rights Tethering Anti virus software Working 24/7/365 Cloud storage Pharming Backup and recovery Public communication Scalability Cloud computing Ad Hoc Network Firewall Industrial espionage Device hardening Infrastructure Open Wifi Network Downtime Ransomware Disruption Internal threats Personal Hotspot Remote working Two factor authentication Trojan Horse Social Engineering Stakeholders
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Traditional computing
Disaster recovery
Rural
Biometrics
Email
Bandwidth
Denial of service
Access Rights
Tethering
Anti virus software
Working 24/7/365
Cloud storage
Pharming
Backup and recovery
Public communication
Scalability
Cloud computing
Ad Hoc Network
Firewall
Industrial espionage
Device hardening
Infrastructure
Open Wifi Network
Downtime
Ransomware
Disruption
Internal threats
Personal Hotspot
Remote working
Two factor authentication
Trojan Horse
Social Engineering
Stakeholders