Internal threats Downtime Scalability Ad Hoc Network Bandwidth Traditional computing Working 24/7/365 Ransomware Cloud computing Email Backup and recovery Social Engineering Access Rights Two factor authentication Anti virus software Disaster recovery Stakeholders Trojan Horse Industrial espionage Personal Hotspot Public communication Denial of service Open Wifi Network Remote working Rural Cloud storage Biometrics Device hardening Pharming Infrastructure Firewall Tethering Disruption Internal threats Downtime Scalability Ad Hoc Network Bandwidth Traditional computing Working 24/7/365 Ransomware Cloud computing Email Backup and recovery Social Engineering Access Rights Two factor authentication Anti virus software Disaster recovery Stakeholders Trojan Horse Industrial espionage Personal Hotspot Public communication Denial of service Open Wifi Network Remote working Rural Cloud storage Biometrics Device hardening Pharming Infrastructure Firewall Tethering Disruption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Internal threats
Downtime
Scalability
Ad Hoc Network
Bandwidth
Traditional computing
Working 24/7/365
Ransomware
Cloud computing
Email
Backup and recovery
Social Engineering
Access Rights
Two factor authentication
Anti virus software
Disaster recovery
Stakeholders
Trojan Horse
Industrial espionage
Personal Hotspot
Public communication
Denial of service
Open Wifi Network
Remote working
Rural
Cloud storage
Biometrics
Device hardening
Pharming
Infrastructure
Firewall
Tethering
Disruption