Man in the middle Denial of service Cyber attack Financial gain Pen testing BYOD Downtime Policies Shoulder surfing Malware Ransomware attack Biometrics Passwords Firewall White hat hacker Unauthorised access Disaster recovery Grey hat hacker Encryption Anti- virus Device hardening Modern teams Pharming Phishing Industrial espionage Decryption Internal threats Black hat hacker Backup and recovery Social engineering Cloud storage 2FA Software/interface design Cloud computing External threats Disruption Man in the middle Denial of service Cyber attack Financial gain Pen testing BYOD Downtime Policies Shoulder surfing Malware Ransomware attack Biometrics Passwords Firewall White hat hacker Unauthorised access Disaster recovery Grey hat hacker Encryption Anti- virus Device hardening Modern teams Pharming Phishing Industrial espionage Decryption Internal threats Black hat hacker Backup and recovery Social engineering Cloud storage 2FA Software/interface design Cloud computing External threats Disruption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Man in the middle
Denial of service
Cyber attack
Financial gain
Pen testing
BYOD
Downtime
Policies
Shoulder surfing
Malware
Ransomware attack
Biometrics
Passwords
Firewall
White hat hacker
Unauthorised access
Disaster recovery
Grey hat hacker
Encryption
Anti-virus
Device hardening
Modern teams
Pharming
Phishing
Industrial espionage
Decryption
Internal threats
Black hat hacker
Backup and recovery
Social engineering
Cloud storage
2FA
Software/interface design
Cloud computing
External threats
Disruption