Financial gain Biometrics Pharming Ransomware attack Unauthorised access Policies Pen testing Decryption Backup and recovery Disaster recovery Cloud storage Shoulder surfing Firewall Cloud computing External threats 2FA Industrial espionage White hat hacker Anti- virus Cyber attack Grey hat hacker Black hat hacker Man in the middle Passwords Encryption Phishing Device hardening Modern teams Malware Downtime Disruption Social engineering Software/interface design Denial of service BYOD Internal threats Financial gain Biometrics Pharming Ransomware attack Unauthorised access Policies Pen testing Decryption Backup and recovery Disaster recovery Cloud storage Shoulder surfing Firewall Cloud computing External threats 2FA Industrial espionage White hat hacker Anti- virus Cyber attack Grey hat hacker Black hat hacker Man in the middle Passwords Encryption Phishing Device hardening Modern teams Malware Downtime Disruption Social engineering Software/interface design Denial of service BYOD Internal threats
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Financial gain
Biometrics
Pharming
Ransomware attack
Unauthorised access
Policies
Pen testing
Decryption
Backup and recovery
Disaster recovery
Cloud storage
Shoulder surfing
Firewall
Cloud computing
External threats
2FA
Industrial espionage
White hat hacker
Anti-virus
Cyber attack
Grey hat hacker
Black hat hacker
Man in the middle
Passwords
Encryption
Phishing
Device hardening
Modern teams
Malware
Downtime
Disruption
Social engineering
Software/interface design
Denial of service
BYOD
Internal threats