Cyber attack External threats Black hat hacker Unauthorised access Biometrics Modern teams Denial of service Pen testing Device hardening Passwords Financial gain Phishing Social engineering Cloud storage Downtime Malware Decryption Ransomware attack Pharming Software/interface design BYOD Disaster recovery Encryption Grey hat hacker Anti- virus Industrial espionage Policies Man in the middle Backup and recovery Internal threats Disruption Shoulder surfing Cloud computing White hat hacker 2FA Firewall Cyber attack External threats Black hat hacker Unauthorised access Biometrics Modern teams Denial of service Pen testing Device hardening Passwords Financial gain Phishing Social engineering Cloud storage Downtime Malware Decryption Ransomware attack Pharming Software/interface design BYOD Disaster recovery Encryption Grey hat hacker Anti- virus Industrial espionage Policies Man in the middle Backup and recovery Internal threats Disruption Shoulder surfing Cloud computing White hat hacker 2FA Firewall
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyber attack
External threats
Black hat hacker
Unauthorised access
Biometrics
Modern teams
Denial of service
Pen testing
Device hardening
Passwords
Financial gain
Phishing
Social engineering
Cloud storage
Downtime
Malware
Decryption
Ransomware attack
Pharming
Software/interface design
BYOD
Disaster recovery
Encryption
Grey hat hacker
Anti-virus
Industrial espionage
Policies
Man in the middle
Backup and recovery
Internal threats
Disruption
Shoulder surfing
Cloud computing
White hat hacker
2FA
Firewall