Internal threats Modern teams Pen testing Software/interface design Grey hat hacker BYOD 2FA Anti- virus White hat hacker Disaster recovery Encryption Cyber attack Firewall Disruption Phishing Decryption Downtime Cloud computing Biometrics Passwords Denial of service Industrial espionage Ransomware attack Black hat hacker Financial gain Policies Man in the middle Pharming Backup and recovery Shoulder surfing Cloud storage Malware Unauthorised access Social engineering Device hardening External threats Internal threats Modern teams Pen testing Software/interface design Grey hat hacker BYOD 2FA Anti- virus White hat hacker Disaster recovery Encryption Cyber attack Firewall Disruption Phishing Decryption Downtime Cloud computing Biometrics Passwords Denial of service Industrial espionage Ransomware attack Black hat hacker Financial gain Policies Man in the middle Pharming Backup and recovery Shoulder surfing Cloud storage Malware Unauthorised access Social engineering Device hardening External threats
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Internal threats
Modern teams
Pen testing
Software/interface design
Grey hat hacker
BYOD
2FA
Anti-virus
White hat hacker
Disaster recovery
Encryption
Cyber attack
Firewall
Disruption
Phishing
Decryption
Downtime
Cloud computing
Biometrics
Passwords
Denial of service
Industrial espionage
Ransomware attack
Black hat hacker
Financial gain
Policies
Man in the middle
Pharming
Backup and recovery
Shoulder surfing
Cloud storage
Malware
Unauthorised access
Social engineering
Device hardening
External threats