Infrastructure Traditional computing Email Disruption Public communication Downtime Anti virus software Scalability Social Engineering Denial of service Tethering Access Rights Rural Stakeholders Ad Hoc Network Pharming Working 24/7/365 Two factor authentication Ransomware Device hardening Internal threats Industrial espionage Disaster recovery Backup and recovery Open Wifi Network Trojan Horse Remote working Biometrics Bandwidth Firewall Cloud storage Cloud computing Personal Hotspot Infrastructure Traditional computing Email Disruption Public communication Downtime Anti virus software Scalability Social Engineering Denial of service Tethering Access Rights Rural Stakeholders Ad Hoc Network Pharming Working 24/7/365 Two factor authentication Ransomware Device hardening Internal threats Industrial espionage Disaster recovery Backup and recovery Open Wifi Network Trojan Horse Remote working Biometrics Bandwidth Firewall Cloud storage Cloud computing Personal Hotspot
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Infrastructure
Traditional computing
Email
Disruption
Public communication
Downtime
Anti virus software
Scalability
Social Engineering
Denial of service
Tethering
Access Rights
Rural
Stakeholders
Ad Hoc Network
Pharming
Working 24/7/365
Two factor authentication
Ransomware
Device hardening
Internal threats
Industrial espionage
Disaster recovery
Backup and recovery
Open Wifi Network
Trojan Horse
Remote working
Biometrics
Bandwidth
Firewall
Cloud storage
Cloud computing
Personal Hotspot