Man in the middle Pen testing Pharming Encryption Passwords Policies Cyber attack Ransomware attack Grey hat hacker Decryption Malware Cloud storage Financial gain Social engineering Phishing Black hat hacker Denial of service Software/interface design Disruption Anti- virus Industrial espionage Unauthorised access Disaster recovery Biometrics Cloud computing Firewall Shoulder surfing External threats Modern teams White hat hacker Downtime Backup and recovery 2FA BYOD Device hardening Internal threats Man in the middle Pen testing Pharming Encryption Passwords Policies Cyber attack Ransomware attack Grey hat hacker Decryption Malware Cloud storage Financial gain Social engineering Phishing Black hat hacker Denial of service Software/interface design Disruption Anti- virus Industrial espionage Unauthorised access Disaster recovery Biometrics Cloud computing Firewall Shoulder surfing External threats Modern teams White hat hacker Downtime Backup and recovery 2FA BYOD Device hardening Internal threats
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Man in the middle
Pen testing
Pharming
Encryption
Passwords
Policies
Cyber attack
Ransomware attack
Grey hat hacker
Decryption
Malware
Cloud storage
Financial gain
Social engineering
Phishing
Black hat hacker
Denial of service
Software/interface design
Disruption
Anti-virus
Industrial espionage
Unauthorised access
Disaster recovery
Biometrics
Cloud computing
Firewall
Shoulder surfing
External threats
Modern teams
White hat hacker
Downtime
Backup and recovery
2FA
BYOD
Device hardening
Internal threats