BYOD Policies Anti- virus Cloud storage Downtime Backup and recovery Internal threats Black hat hacker Pharming Grey hat hacker Disaster recovery Disruption Encryption Biometrics Decryption White hat hacker Industrial espionage Social engineering Unauthorised access Device hardening Pen testing Phishing Denial of service Malware Cloud computing Man in the middle External threats Financial gain Cyber attack Ransomware attack 2FA Modern teams Firewall Software/interface design Passwords Shoulder surfing BYOD Policies Anti- virus Cloud storage Downtime Backup and recovery Internal threats Black hat hacker Pharming Grey hat hacker Disaster recovery Disruption Encryption Biometrics Decryption White hat hacker Industrial espionage Social engineering Unauthorised access Device hardening Pen testing Phishing Denial of service Malware Cloud computing Man in the middle External threats Financial gain Cyber attack Ransomware attack 2FA Modern teams Firewall Software/interface design Passwords Shoulder surfing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
BYOD
Policies
Anti-virus
Cloud storage
Downtime
Backup and recovery
Internal threats
Black hat hacker
Pharming
Grey hat hacker
Disaster recovery
Disruption
Encryption
Biometrics
Decryption
White hat hacker
Industrial espionage
Social engineering
Unauthorised access
Device hardening
Pen testing
Phishing
Denial of service
Malware
Cloud computing
Man in the middle
External threats
Financial gain
Cyber attack
Ransomware attack
2FA
Modern teams
Firewall
Software/interface design
Passwords
Shoulder surfing