Software/interface design Internal threats Malware Pharming Disaster recovery External threats Anti- virus Cyber attack Phishing Cloud computing Industrial espionage Shoulder surfing Black hat hacker Ransomware attack Biometrics Modern teams Backup and recovery Downtime Encryption BYOD Disruption 2FA Unauthorised access Firewall White hat hacker Grey hat hacker Device hardening Policies Social engineering Pen testing Cloud storage Passwords Decryption Financial gain Denial of service Man in the middle Software/interface design Internal threats Malware Pharming Disaster recovery External threats Anti- virus Cyber attack Phishing Cloud computing Industrial espionage Shoulder surfing Black hat hacker Ransomware attack Biometrics Modern teams Backup and recovery Downtime Encryption BYOD Disruption 2FA Unauthorised access Firewall White hat hacker Grey hat hacker Device hardening Policies Social engineering Pen testing Cloud storage Passwords Decryption Financial gain Denial of service Man in the middle
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Software/interface design
Internal threats
Malware
Pharming
Disaster recovery
External threats
Anti-virus
Cyber attack
Phishing
Cloud computing
Industrial espionage
Shoulder surfing
Black hat hacker
Ransomware attack
Biometrics
Modern teams
Backup and recovery
Downtime
Encryption
BYOD
Disruption
2FA
Unauthorised access
Firewall
White hat hacker
Grey hat hacker
Device hardening
Policies
Social engineering
Pen testing
Cloud storage
Passwords
Decryption
Financial gain
Denial of service
Man in the middle