Black hat hacker Biometrics Cloud computing White hat hacker Man in the middle Social engineering Phishing Industrial espionage Ransomware attack Downtime Encryption Firewall Device hardening Cloud storage Anti- virus Malware Decryption Passwords Shoulder surfing 2FA Pen testing Backup and recovery Disruption Cyber attack Unauthorised access Software/interface design BYOD Disaster recovery Modern teams Policies Pharming Grey hat hacker Internal threats Financial gain External threats Denial of service Black hat hacker Biometrics Cloud computing White hat hacker Man in the middle Social engineering Phishing Industrial espionage Ransomware attack Downtime Encryption Firewall Device hardening Cloud storage Anti- virus Malware Decryption Passwords Shoulder surfing 2FA Pen testing Backup and recovery Disruption Cyber attack Unauthorised access Software/interface design BYOD Disaster recovery Modern teams Policies Pharming Grey hat hacker Internal threats Financial gain External threats Denial of service
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Black hat hacker
Biometrics
Cloud computing
White hat hacker
Man in the middle
Social engineering
Phishing
Industrial espionage
Ransomware attack
Downtime
Encryption
Firewall
Device hardening
Cloud storage
Anti-virus
Malware
Decryption
Passwords
Shoulder surfing
2FA
Pen testing
Backup and recovery
Disruption
Cyber attack
Unauthorised access
Software/interface design
BYOD
Disaster recovery
Modern teams
Policies
Pharming
Grey hat hacker
Internal threats
Financial gain
External threats
Denial of service