Phishing Software/interface design Encryption Cyber attack Internal threats Modern teams Grey hat hacker Denial of service 2FA Decryption Anti- virus Disaster recovery Man in the middle Shoulder surfing Backup and recovery Black hat hacker Downtime Disruption Pharming Pen testing External threats Passwords Industrial espionage Financial gain Malware Firewall Biometrics Device hardening Social engineering BYOD Cloud computing White hat hacker Ransomware attack Unauthorised access Policies Cloud storage Phishing Software/interface design Encryption Cyber attack Internal threats Modern teams Grey hat hacker Denial of service 2FA Decryption Anti- virus Disaster recovery Man in the middle Shoulder surfing Backup and recovery Black hat hacker Downtime Disruption Pharming Pen testing External threats Passwords Industrial espionage Financial gain Malware Firewall Biometrics Device hardening Social engineering BYOD Cloud computing White hat hacker Ransomware attack Unauthorised access Policies Cloud storage
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Software/interface design
Encryption
Cyber attack
Internal threats
Modern teams
Grey hat hacker
Denial of service
2FA
Decryption
Anti-virus
Disaster recovery
Man in the middle
Shoulder surfing
Backup and recovery
Black hat hacker
Downtime
Disruption
Pharming
Pen testing
External threats
Passwords
Industrial espionage
Financial gain
Malware
Firewall
Biometrics
Device hardening
Social engineering
BYOD
Cloud computing
White hat hacker
Ransomware attack
Unauthorised access
Policies
Cloud storage