Cyber attack Encryption Phishing Financial gain Downtime BYOD Biometrics Decryption Pen testing Grey hat hacker Unauthorised access Social engineering Internal threats Pharming Shoulder surfing Device hardening Passwords Cloud computing Firewall Man in the middle Backup and recovery Policies Modern teams External threats Black hat hacker White hat hacker Disruption Denial of service Software/interface design Ransomware attack Malware Anti- virus 2FA Disaster recovery Cloud storage Industrial espionage Cyber attack Encryption Phishing Financial gain Downtime BYOD Biometrics Decryption Pen testing Grey hat hacker Unauthorised access Social engineering Internal threats Pharming Shoulder surfing Device hardening Passwords Cloud computing Firewall Man in the middle Backup and recovery Policies Modern teams External threats Black hat hacker White hat hacker Disruption Denial of service Software/interface design Ransomware attack Malware Anti- virus 2FA Disaster recovery Cloud storage Industrial espionage
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyber attack
Encryption
Phishing
Financial gain
Downtime
BYOD
Biometrics
Decryption
Pen testing
Grey hat hacker
Unauthorised access
Social engineering
Internal threats
Pharming
Shoulder surfing
Device hardening
Passwords
Cloud computing
Firewall
Man in the middle
Backup and recovery
Policies
Modern teams
External threats
Black hat hacker
White hat hacker
Disruption
Denial of service
Software/interface design
Ransomware attack
Malware
Anti-virus
2FA
Disaster recovery
Cloud storage
Industrial espionage