Firewall Unauthorised access 2FA External threats Software/interface design Modern teams Encryption Backup and recovery Anti- virus BYOD Passwords Device hardening Financial gain White hat hacker Pharming Ransomware attack Grey hat hacker Policies Disaster recovery Internal threats Industrial espionage Pen testing Denial of service Cyber attack Social engineering Man in the middle Cloud storage Phishing Cloud computing Shoulder surfing Downtime Black hat hacker Disruption Decryption Malware Biometrics Firewall Unauthorised access 2FA External threats Software/interface design Modern teams Encryption Backup and recovery Anti- virus BYOD Passwords Device hardening Financial gain White hat hacker Pharming Ransomware attack Grey hat hacker Policies Disaster recovery Internal threats Industrial espionage Pen testing Denial of service Cyber attack Social engineering Man in the middle Cloud storage Phishing Cloud computing Shoulder surfing Downtime Black hat hacker Disruption Decryption Malware Biometrics
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewall
Unauthorised access
2FA
External threats
Software/interface design
Modern teams
Encryption
Backup and recovery
Anti-virus
BYOD
Passwords
Device hardening
Financial gain
White hat hacker
Pharming
Ransomware attack
Grey hat hacker
Policies
Disaster recovery
Internal threats
Industrial espionage
Pen testing
Denial of service
Cyber attack
Social engineering
Man in the middle
Cloud storage
Phishing
Cloud computing
Shoulder surfing
Downtime
Black hat hacker
Disruption
Decryption
Malware
Biometrics