Unauthorised access Encryption Downtime Malware Grey hat hacker Financial gain Cloud storage Policies Cloud computing Software/interface design Disaster recovery Disruption External threats White hat hacker Industrial espionage Anti- virus BYOD Passwords 2FA Decryption Backup and recovery Denial of service Man in the middle Pharming Pen testing Cyber attack Black hat hacker Phishing Internal threats Social engineering Biometrics Ransomware attack Modern teams Device hardening Firewall Shoulder surfing Unauthorised access Encryption Downtime Malware Grey hat hacker Financial gain Cloud storage Policies Cloud computing Software/interface design Disaster recovery Disruption External threats White hat hacker Industrial espionage Anti- virus BYOD Passwords 2FA Decryption Backup and recovery Denial of service Man in the middle Pharming Pen testing Cyber attack Black hat hacker Phishing Internal threats Social engineering Biometrics Ransomware attack Modern teams Device hardening Firewall Shoulder surfing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Unauthorised access
Encryption
Downtime
Malware
Grey hat hacker
Financial gain
Cloud storage
Policies
Cloud computing
Software/interface design
Disaster recovery
Disruption
External threats
White hat hacker
Industrial espionage
Anti-virus
BYOD
Passwords
2FA
Decryption
Backup and recovery
Denial of service
Man in the middle
Pharming
Pen testing
Cyber attack
Black hat hacker
Phishing
Internal threats
Social engineering
Biometrics
Ransomware attack
Modern teams
Device hardening
Firewall
Shoulder surfing