Anti- virus Cloud computing Man in the middle Black hat hacker Internal threats Disruption Phishing Device hardening Backup and recovery Denial of service Downtime Modern teams External threats Cloud storage Social engineering Disaster recovery Financial gain Grey hat hacker 2FA Pharming Passwords Software/interface design Encryption Pen testing Industrial espionage Biometrics Policies Cyber attack Firewall Shoulder surfing Unauthorised access BYOD Ransomware attack Malware Decryption White hat hacker Anti- virus Cloud computing Man in the middle Black hat hacker Internal threats Disruption Phishing Device hardening Backup and recovery Denial of service Downtime Modern teams External threats Cloud storage Social engineering Disaster recovery Financial gain Grey hat hacker 2FA Pharming Passwords Software/interface design Encryption Pen testing Industrial espionage Biometrics Policies Cyber attack Firewall Shoulder surfing Unauthorised access BYOD Ransomware attack Malware Decryption White hat hacker
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Anti-virus
Cloud computing
Man in the middle
Black hat hacker
Internal threats
Disruption
Phishing
Device hardening
Backup and recovery
Denial of service
Downtime
Modern teams
External threats
Cloud storage
Social engineering
Disaster recovery
Financial gain
Grey hat hacker
2FA
Pharming
Passwords
Software/interface design
Encryption
Pen testing
Industrial espionage
Biometrics
Policies
Cyber attack
Firewall
Shoulder surfing
Unauthorised access
BYOD
Ransomware attack
Malware
Decryption
White hat hacker