Software/interface design Firewall Disaster recovery Ransomware attack Decryption Disruption Downtime Cloud storage Malware Black hat hacker Unauthorised access Anti- virus Backup and recovery Policies Biometrics Shoulder surfing 2FA Internal threats Man in the middle Cloud computing Pen testing Denial of service Device hardening Grey hat hacker Financial gain Encryption Phishing External threats Social engineering Industrial espionage Cyber attack White hat hacker Pharming Passwords BYOD Modern teams Software/interface design Firewall Disaster recovery Ransomware attack Decryption Disruption Downtime Cloud storage Malware Black hat hacker Unauthorised access Anti- virus Backup and recovery Policies Biometrics Shoulder surfing 2FA Internal threats Man in the middle Cloud computing Pen testing Denial of service Device hardening Grey hat hacker Financial gain Encryption Phishing External threats Social engineering Industrial espionage Cyber attack White hat hacker Pharming Passwords BYOD Modern teams
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Software/interface design
Firewall
Disaster recovery
Ransomware attack
Decryption
Disruption
Downtime
Cloud storage
Malware
Black hat hacker
Unauthorised access
Anti-virus
Backup and recovery
Policies
Biometrics
Shoulder surfing
2FA
Internal threats
Man in the middle
Cloud computing
Pen testing
Denial of service
Device hardening
Grey hat hacker
Financial gain
Encryption
Phishing
External threats
Social engineering
Industrial espionage
Cyber attack
White hat hacker
Pharming
Passwords
BYOD
Modern teams