Social engineering Decryption Encryption Pharming Cloud storage External threats Cyber attack Backup and recovery Malware White hat hacker Black hat hacker Grey hat hacker Man in the middle Anti- virus Denial of service Industrial espionage 2FA Passwords Shoulder surfing Unauthorised access Biometrics Disruption Disaster recovery Device hardening Internal threats Ransomware attack Phishing Firewall Policies Software/interface design Modern teams Financial gain BYOD Downtime Cloud computing Pen testing Social engineering Decryption Encryption Pharming Cloud storage External threats Cyber attack Backup and recovery Malware White hat hacker Black hat hacker Grey hat hacker Man in the middle Anti- virus Denial of service Industrial espionage 2FA Passwords Shoulder surfing Unauthorised access Biometrics Disruption Disaster recovery Device hardening Internal threats Ransomware attack Phishing Firewall Policies Software/interface design Modern teams Financial gain BYOD Downtime Cloud computing Pen testing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Social engineering
Decryption
Encryption
Pharming
Cloud storage
External threats
Cyber attack
Backup and recovery
Malware
White hat hacker
Black hat hacker
Grey hat hacker
Man in the middle
Anti-virus
Denial of service
Industrial espionage
2FA
Passwords
Shoulder surfing
Unauthorised access
Biometrics
Disruption
Disaster recovery
Device hardening
Internal threats
Ransomware attack
Phishing
Firewall
Policies
Software/interface design
Modern teams
Financial gain
BYOD
Downtime
Cloud computing
Pen testing