Backup and recovery Phishing Black hat hacker Passwords Social engineering Encryption Anti- virus External threats Disruption Pen testing Modern teams Cyber attack White hat hacker Financial gain Biometrics Policies Industrial espionage Malware Software/interface design Man in the middle Firewall Unauthorised access Internal threats Decryption Denial of service Grey hat hacker Cloud computing Downtime BYOD Cloud storage 2FA Ransomware attack Shoulder surfing Device hardening Pharming Disaster recovery Backup and recovery Phishing Black hat hacker Passwords Social engineering Encryption Anti- virus External threats Disruption Pen testing Modern teams Cyber attack White hat hacker Financial gain Biometrics Policies Industrial espionage Malware Software/interface design Man in the middle Firewall Unauthorised access Internal threats Decryption Denial of service Grey hat hacker Cloud computing Downtime BYOD Cloud storage 2FA Ransomware attack Shoulder surfing Device hardening Pharming Disaster recovery
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Backup and recovery
Phishing
Black hat hacker
Passwords
Social engineering
Encryption
Anti-virus
External threats
Disruption
Pen testing
Modern teams
Cyber attack
White hat hacker
Financial gain
Biometrics
Policies
Industrial espionage
Malware
Software/interface design
Man in the middle
Firewall
Unauthorised access
Internal threats
Decryption
Denial of service
Grey hat hacker
Cloud computing
Downtime
BYOD
Cloud storage
2FA
Ransomware attack
Shoulder surfing
Device hardening
Pharming
Disaster recovery