Malware External threats Disaster recovery Social engineering White hat hacker Decryption Cloud storage Industrial espionage Internal threats Firewall Passwords 2FA Unauthorised access Black hat hacker BYOD Ransomware attack Financial gain Biometrics Man in the middle Software/interface design Encryption Anti- virus Policies Shoulder surfing Pharming Disruption Cloud computing Device hardening Downtime Denial of service Cyber attack Backup and recovery Grey hat hacker Pen testing Phishing Modern teams Malware External threats Disaster recovery Social engineering White hat hacker Decryption Cloud storage Industrial espionage Internal threats Firewall Passwords 2FA Unauthorised access Black hat hacker BYOD Ransomware attack Financial gain Biometrics Man in the middle Software/interface design Encryption Anti- virus Policies Shoulder surfing Pharming Disruption Cloud computing Device hardening Downtime Denial of service Cyber attack Backup and recovery Grey hat hacker Pen testing Phishing Modern teams
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Malware
External threats
Disaster recovery
Social engineering
White hat hacker
Decryption
Cloud storage
Industrial espionage
Internal threats
Firewall
Passwords
2FA
Unauthorised access
Black hat hacker
BYOD
Ransomware attack
Financial gain
Biometrics
Man in the middle
Software/interface design
Encryption
Anti-virus
Policies
Shoulder surfing
Pharming
Disruption
Cloud computing
Device hardening
Downtime
Denial of service
Cyber attack
Backup and recovery
Grey hat hacker
Pen testing
Phishing
Modern teams