White hat hacker Anti- virus External threats Black hat hacker Unauthorised access Pharming Phishing Cloud storage 2FA Passwords BYOD Man in the middle Disaster recovery Device hardening Disruption Policies Malware Social engineering Decryption Downtime Backup and recovery Biometrics Encryption Shoulder surfing Firewall Grey hat hacker Internal threats Cloud computing Industrial espionage Modern teams Denial of service Pen testing Cyber attack Ransomware attack Software/interface design Financial gain White hat hacker Anti- virus External threats Black hat hacker Unauthorised access Pharming Phishing Cloud storage 2FA Passwords BYOD Man in the middle Disaster recovery Device hardening Disruption Policies Malware Social engineering Decryption Downtime Backup and recovery Biometrics Encryption Shoulder surfing Firewall Grey hat hacker Internal threats Cloud computing Industrial espionage Modern teams Denial of service Pen testing Cyber attack Ransomware attack Software/interface design Financial gain
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
White hat hacker
Anti-virus
External threats
Black hat hacker
Unauthorised access
Pharming
Phishing
Cloud storage
2FA
Passwords
BYOD
Man in the middle
Disaster recovery
Device hardening
Disruption
Policies
Malware
Social engineering
Decryption
Downtime
Backup and recovery
Biometrics
Encryption
Shoulder surfing
Firewall
Grey hat hacker
Internal threats
Cloud computing
Industrial espionage
Modern teams
Denial of service
Pen testing
Cyber attack
Ransomware attack
Software/interface design
Financial gain