White hat hacker Software/interface design Black hat hacker Unauthorised access Passwords Decryption Denial of service Grey hat hacker Disaster recovery Cloud storage Modern teams 2FA Man in the middle Social engineering Cyber attack Internal threats Financial gain Device hardening Biometrics Encryption Ransomware attack Malware Downtime Policies BYOD Backup and recovery Pharming Phishing Anti- virus Cloud computing External threats Shoulder surfing Industrial espionage Firewall Disruption Pen testing White hat hacker Software/interface design Black hat hacker Unauthorised access Passwords Decryption Denial of service Grey hat hacker Disaster recovery Cloud storage Modern teams 2FA Man in the middle Social engineering Cyber attack Internal threats Financial gain Device hardening Biometrics Encryption Ransomware attack Malware Downtime Policies BYOD Backup and recovery Pharming Phishing Anti- virus Cloud computing External threats Shoulder surfing Industrial espionage Firewall Disruption Pen testing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
White hat hacker
Software/interface design
Black hat hacker
Unauthorised access
Passwords
Decryption
Denial of service
Grey hat hacker
Disaster recovery
Cloud storage
Modern teams
2FA
Man in the middle
Social engineering
Cyber attack
Internal threats
Financial gain
Device hardening
Biometrics
Encryption
Ransomware attack
Malware
Downtime
Policies
BYOD
Backup and recovery
Pharming
Phishing
Anti-virus
Cloud computing
External threats
Shoulder surfing
Industrial espionage
Firewall
Disruption
Pen testing