2FA Grey hat hacker Cloud computing Disaster recovery Social engineering Decryption External threats Ransomware attack Anti- virus Cyber attack Firewall Modern teams Disruption Pharming Denial of service Passwords Software/interface design Internal threats BYOD Cloud storage Encryption Financial gain Pen testing Unauthorised access Downtime Policies Shoulder surfing Biometrics Industrial espionage White hat hacker Malware Man in the middle Phishing Black hat hacker Device hardening Backup and recovery 2FA Grey hat hacker Cloud computing Disaster recovery Social engineering Decryption External threats Ransomware attack Anti- virus Cyber attack Firewall Modern teams Disruption Pharming Denial of service Passwords Software/interface design Internal threats BYOD Cloud storage Encryption Financial gain Pen testing Unauthorised access Downtime Policies Shoulder surfing Biometrics Industrial espionage White hat hacker Malware Man in the middle Phishing Black hat hacker Device hardening Backup and recovery
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
2FA
Grey hat hacker
Cloud computing
Disaster recovery
Social engineering
Decryption
External threats
Ransomware attack
Anti-virus
Cyber attack
Firewall
Modern teams
Disruption
Pharming
Denial of service
Passwords
Software/interface design
Internal threats
BYOD
Cloud storage
Encryption
Financial gain
Pen testing
Unauthorised access
Downtime
Policies
Shoulder surfing
Biometrics
Industrial espionage
White hat hacker
Malware
Man in the middle
Phishing
Black hat hacker
Device hardening
Backup and recovery