Anti- virus Cloud computing Pen testing Denial of service Biometrics Cloud storage External threats Encryption BYOD White hat hacker Man in the middle Software/interface design Internal threats Ransomware attack Black hat hacker 2FA Policies Downtime Device hardening Shoulder surfing Phishing Passwords Unauthorised access Disruption Grey hat hacker Financial gain Decryption Disaster recovery Firewall Malware Industrial espionage Social engineering Cyber attack Backup and recovery Modern teams Pharming Anti- virus Cloud computing Pen testing Denial of service Biometrics Cloud storage External threats Encryption BYOD White hat hacker Man in the middle Software/interface design Internal threats Ransomware attack Black hat hacker 2FA Policies Downtime Device hardening Shoulder surfing Phishing Passwords Unauthorised access Disruption Grey hat hacker Financial gain Decryption Disaster recovery Firewall Malware Industrial espionage Social engineering Cyber attack Backup and recovery Modern teams Pharming
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Anti-virus
Cloud computing
Pen testing
Denial of service
Biometrics
Cloud storage
External threats
Encryption
BYOD
White hat hacker
Man in the middle
Software/interface design
Internal threats
Ransomware attack
Black hat hacker
2FA
Policies
Downtime
Device hardening
Shoulder surfing
Phishing
Passwords
Unauthorised access
Disruption
Grey hat hacker
Financial gain
Decryption
Disaster recovery
Firewall
Malware
Industrial espionage
Social engineering
Cyber attack
Backup and recovery
Modern teams
Pharming