Black hat hacker Cloud computing Unauthorised access White hat hacker Grey hat hacker Backup and recovery Anti- virus Ransomware attack Passwords Cloud storage Cyber attack Biometrics 2FA Man in the middle Financial gain Phishing Modern teams Policies Malware Industrial espionage Internal threats Firewall Decryption External threats Shoulder surfing Pen testing Software/interface design Encryption Denial of service Disaster recovery Pharming Social engineering Downtime Device hardening BYOD Disruption Black hat hacker Cloud computing Unauthorised access White hat hacker Grey hat hacker Backup and recovery Anti- virus Ransomware attack Passwords Cloud storage Cyber attack Biometrics 2FA Man in the middle Financial gain Phishing Modern teams Policies Malware Industrial espionage Internal threats Firewall Decryption External threats Shoulder surfing Pen testing Software/interface design Encryption Denial of service Disaster recovery Pharming Social engineering Downtime Device hardening BYOD Disruption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Black hat hacker
Cloud computing
Unauthorised access
White hat hacker
Grey hat hacker
Backup and recovery
Anti-virus
Ransomware attack
Passwords
Cloud storage
Cyber attack
Biometrics
2FA
Man in the middle
Financial gain
Phishing
Modern teams
Policies
Malware
Industrial espionage
Internal threats
Firewall
Decryption
External threats
Shoulder surfing
Pen testing
Software/interface design
Encryption
Denial of service
Disaster recovery
Pharming
Social engineering
Downtime
Device hardening
BYOD
Disruption