Modern teams Biometrics Phishing Decryption Downtime BYOD Financial gain Anti- virus Cyber attack Malware Ransomware attack Software/interface design Social engineering External threats Cloud computing Black hat hacker Backup and recovery White hat hacker Man in the middle Firewall Industrial espionage Passwords Encryption 2FA Device hardening Disaster recovery Cloud storage Disruption Pharming Unauthorised access Internal threats Shoulder surfing Policies Pen testing Grey hat hacker Denial of service Modern teams Biometrics Phishing Decryption Downtime BYOD Financial gain Anti- virus Cyber attack Malware Ransomware attack Software/interface design Social engineering External threats Cloud computing Black hat hacker Backup and recovery White hat hacker Man in the middle Firewall Industrial espionage Passwords Encryption 2FA Device hardening Disaster recovery Cloud storage Disruption Pharming Unauthorised access Internal threats Shoulder surfing Policies Pen testing Grey hat hacker Denial of service
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Modern teams
Biometrics
Phishing
Decryption
Downtime
BYOD
Financial gain
Anti-virus
Cyber attack
Malware
Ransomware attack
Software/interface design
Social engineering
External threats
Cloud computing
Black hat hacker
Backup and recovery
White hat hacker
Man in the middle
Firewall
Industrial espionage
Passwords
Encryption
2FA
Device hardening
Disaster recovery
Cloud storage
Disruption
Pharming
Unauthorised access
Internal threats
Shoulder surfing
Policies
Pen testing
Grey hat hacker
Denial of service