Financial gain Phishing Malware Shoulder surfing Social engineering Grey hat hacker Passwords Man in the middle Cloud computing Black hat hacker Disruption Modern teams Biometrics Firewall Device hardening Encryption Industrial espionage Denial of service Pharming Ransomware attack BYOD Policies Software/interface design 2FA Cyber attack Decryption Pen testing External threats Downtime Cloud storage Anti- virus Backup and recovery Unauthorised access Disaster recovery Internal threats White hat hacker Financial gain Phishing Malware Shoulder surfing Social engineering Grey hat hacker Passwords Man in the middle Cloud computing Black hat hacker Disruption Modern teams Biometrics Firewall Device hardening Encryption Industrial espionage Denial of service Pharming Ransomware attack BYOD Policies Software/interface design 2FA Cyber attack Decryption Pen testing External threats Downtime Cloud storage Anti- virus Backup and recovery Unauthorised access Disaster recovery Internal threats White hat hacker
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Financial gain
Phishing
Malware
Shoulder surfing
Social engineering
Grey hat hacker
Passwords
Man in the middle
Cloud computing
Black hat hacker
Disruption
Modern teams
Biometrics
Firewall
Device hardening
Encryption
Industrial espionage
Denial of service
Pharming
Ransomware attack
BYOD
Policies
Software/interface design
2FA
Cyber attack
Decryption
Pen testing
External threats
Downtime
Cloud storage
Anti-virus
Backup and recovery
Unauthorised access
Disaster recovery
Internal threats
White hat hacker