Anti- virus Internal threats Shoulder surfing Cloud storage Backup and recovery 2FA Malware Software/interface design BYOD Downtime White hat hacker Device hardening Ransomware attack Modern teams Unauthorised access Passwords Social engineering Firewall Disaster recovery Denial of service Pen testing Disruption Industrial espionage Pharming Encryption Man in the middle Black hat hacker Biometrics Decryption Cloud computing Cyber attack External threats Phishing Grey hat hacker Financial gain Policies Anti- virus Internal threats Shoulder surfing Cloud storage Backup and recovery 2FA Malware Software/interface design BYOD Downtime White hat hacker Device hardening Ransomware attack Modern teams Unauthorised access Passwords Social engineering Firewall Disaster recovery Denial of service Pen testing Disruption Industrial espionage Pharming Encryption Man in the middle Black hat hacker Biometrics Decryption Cloud computing Cyber attack External threats Phishing Grey hat hacker Financial gain Policies
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Anti-virus
Internal threats
Shoulder surfing
Cloud storage
Backup and recovery
2FA
Malware
Software/interface design
BYOD
Downtime
White hat hacker
Device hardening
Ransomware attack
Modern teams
Unauthorised access
Passwords
Social engineering
Firewall
Disaster recovery
Denial of service
Pen testing
Disruption
Industrial espionage
Pharming
Encryption
Man in the middle
Black hat hacker
Biometrics
Decryption
Cloud computing
Cyber attack
External threats
Phishing
Grey hat hacker
Financial gain
Policies