Man in the middle Phishing Social engineering Malware Encryption Internal threats Denial of service Ransomware attack Device hardening Modern teams Unauthorised access Cloud computing Passwords Grey hat hacker External threats Shoulder surfing BYOD Pharming 2FA Pen testing Downtime Disaster recovery Backup and recovery Decryption Software/interface design Anti- virus Firewall Policies White hat hacker Cloud storage Disruption Biometrics Cyber attack Black hat hacker Financial gain Industrial espionage Man in the middle Phishing Social engineering Malware Encryption Internal threats Denial of service Ransomware attack Device hardening Modern teams Unauthorised access Cloud computing Passwords Grey hat hacker External threats Shoulder surfing BYOD Pharming 2FA Pen testing Downtime Disaster recovery Backup and recovery Decryption Software/interface design Anti- virus Firewall Policies White hat hacker Cloud storage Disruption Biometrics Cyber attack Black hat hacker Financial gain Industrial espionage
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Man in the middle
Phishing
Social engineering
Malware
Encryption
Internal threats
Denial of service
Ransomware attack
Device hardening
Modern teams
Unauthorised access
Cloud computing
Passwords
Grey hat hacker
External threats
Shoulder surfing
BYOD
Pharming
2FA
Pen testing
Downtime
Disaster recovery
Backup and recovery
Decryption
Software/interface design
Anti-virus
Firewall
Policies
White hat hacker
Cloud storage
Disruption
Biometrics
Cyber attack
Black hat hacker
Financial gain
Industrial espionage