Social engineering Financial gain 2FA Man in the middle Modern teams Encryption External threats Disruption Black hat hacker Anti- virus Disaster recovery Phishing Cloud storage Grey hat hacker Pen testing Device hardening Denial of service Industrial espionage Internal threats Policies Malware Passwords Downtime Decryption Unauthorised access Cloud computing Software/interface design BYOD Biometrics Backup and recovery Pharming Shoulder surfing White hat hacker Ransomware attack Firewall Cyber attack Social engineering Financial gain 2FA Man in the middle Modern teams Encryption External threats Disruption Black hat hacker Anti- virus Disaster recovery Phishing Cloud storage Grey hat hacker Pen testing Device hardening Denial of service Industrial espionage Internal threats Policies Malware Passwords Downtime Decryption Unauthorised access Cloud computing Software/interface design BYOD Biometrics Backup and recovery Pharming Shoulder surfing White hat hacker Ransomware attack Firewall Cyber attack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Social engineering
Financial gain
2FA
Man in the middle
Modern teams
Encryption
External threats
Disruption
Black hat hacker
Anti-virus
Disaster recovery
Phishing
Cloud storage
Grey hat hacker
Pen testing
Device hardening
Denial of service
Industrial espionage
Internal threats
Policies
Malware
Passwords
Downtime
Decryption
Unauthorised access
Cloud computing
Software/interface design
BYOD
Biometrics
Backup and recovery
Pharming
Shoulder surfing
White hat hacker
Ransomware attack
Firewall
Cyber attack