Cloud storage Internal threats Firewall Malware Encryption Cyber attack Passwords Pen testing Man in the middle Phishing Anti- virus Device hardening Financial gain White hat hacker Denial of service Industrial espionage BYOD Shoulder surfing Biometrics Pharming Backup and recovery Downtime Software/interface design Cloud computing Grey hat hacker Ransomware attack 2FA Disaster recovery Unauthorised access Black hat hacker Social engineering Modern teams External threats Disruption Policies Decryption Cloud storage Internal threats Firewall Malware Encryption Cyber attack Passwords Pen testing Man in the middle Phishing Anti- virus Device hardening Financial gain White hat hacker Denial of service Industrial espionage BYOD Shoulder surfing Biometrics Pharming Backup and recovery Downtime Software/interface design Cloud computing Grey hat hacker Ransomware attack 2FA Disaster recovery Unauthorised access Black hat hacker Social engineering Modern teams External threats Disruption Policies Decryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cloud storage
Internal threats
Firewall
Malware
Encryption
Cyber attack
Passwords
Pen testing
Man in the middle
Phishing
Anti-virus
Device hardening
Financial gain
White hat hacker
Denial of service
Industrial espionage
BYOD
Shoulder surfing
Biometrics
Pharming
Backup and recovery
Downtime
Software/interface design
Cloud computing
Grey hat hacker
Ransomware attack
2FA
Disaster recovery
Unauthorised access
Black hat hacker
Social engineering
Modern teams
External threats
Disruption
Policies
Decryption