Modern teams Denial of service Malware Encryption Cyber attack Disaster recovery Downtime Anti- virus External threats Disruption Man in the middle Decryption White hat hacker Pen testing Backup and recovery Financial gain Grey hat hacker Pharming Software/interface design Phishing Cloud storage Policies Device hardening Black hat hacker Biometrics BYOD Unauthorised access Passwords Firewall 2FA Internal threats Shoulder surfing Ransomware attack Industrial espionage Social engineering Cloud computing Modern teams Denial of service Malware Encryption Cyber attack Disaster recovery Downtime Anti- virus External threats Disruption Man in the middle Decryption White hat hacker Pen testing Backup and recovery Financial gain Grey hat hacker Pharming Software/interface design Phishing Cloud storage Policies Device hardening Black hat hacker Biometrics BYOD Unauthorised access Passwords Firewall 2FA Internal threats Shoulder surfing Ransomware attack Industrial espionage Social engineering Cloud computing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Modern teams
Denial of service
Malware
Encryption
Cyber attack
Disaster recovery
Downtime
Anti-virus
External threats
Disruption
Man in the middle
Decryption
White hat hacker
Pen testing
Backup and recovery
Financial gain
Grey hat hacker
Pharming
Software/interface design
Phishing
Cloud storage
Policies
Device hardening
Black hat hacker
Biometrics
BYOD
Unauthorised access
Passwords
Firewall
2FA
Internal threats
Shoulder surfing
Ransomware attack
Industrial espionage
Social engineering
Cloud computing