BYOD Phishing Policies Downtime Social engineering Denial of service Cloud storage Modern teams Encryption Cyber attack Grey hat hacker Passwords Cloud computing Firewall Internal threats Disaster recovery Decryption Black hat hacker Ransomware attack White hat hacker Industrial espionage Disruption Man in the middle External threats Pharming Biometrics Software/interface design Device hardening 2FA Anti- virus Unauthorised access Financial gain Backup and recovery Pen testing Malware Shoulder surfing BYOD Phishing Policies Downtime Social engineering Denial of service Cloud storage Modern teams Encryption Cyber attack Grey hat hacker Passwords Cloud computing Firewall Internal threats Disaster recovery Decryption Black hat hacker Ransomware attack White hat hacker Industrial espionage Disruption Man in the middle External threats Pharming Biometrics Software/interface design Device hardening 2FA Anti- virus Unauthorised access Financial gain Backup and recovery Pen testing Malware Shoulder surfing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
BYOD
Phishing
Policies
Downtime
Social engineering
Denial of service
Cloud storage
Modern teams
Encryption
Cyber attack
Grey hat hacker
Passwords
Cloud computing
Firewall
Internal threats
Disaster recovery
Decryption
Black hat hacker
Ransomware attack
White hat hacker
Industrial espionage
Disruption
Man in the middle
External threats
Pharming
Biometrics
Software/interface design
Device hardening
2FA
Anti-virus
Unauthorised access
Financial gain
Backup and recovery
Pen testing
Malware
Shoulder surfing