Malware Cyber attack Modern teams Disaster recovery Cloud computing BYOD Pharming Grey hat hacker Passwords Biometrics Software/interface design Policies Device hardening Cloud storage Industrial espionage Shoulder surfing Backup and recovery Ransomware attack Unauthorised access Decryption 2FA Disruption Phishing Internal threats Denial of service Firewall Black hat hacker Social engineering Encryption Pen testing External threats Man in the middle Downtime Anti- virus White hat hacker Financial gain Malware Cyber attack Modern teams Disaster recovery Cloud computing BYOD Pharming Grey hat hacker Passwords Biometrics Software/interface design Policies Device hardening Cloud storage Industrial espionage Shoulder surfing Backup and recovery Ransomware attack Unauthorised access Decryption 2FA Disruption Phishing Internal threats Denial of service Firewall Black hat hacker Social engineering Encryption Pen testing External threats Man in the middle Downtime Anti- virus White hat hacker Financial gain
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Malware
Cyber attack
Modern teams
Disaster recovery
Cloud computing
BYOD
Pharming
Grey hat hacker
Passwords
Biometrics
Software/interface design
Policies
Device hardening
Cloud storage
Industrial espionage
Shoulder surfing
Backup and recovery
Ransomware attack
Unauthorised access
Decryption
2FA
Disruption
Phishing
Internal threats
Denial of service
Firewall
Black hat hacker
Social engineering
Encryption
Pen testing
External threats
Man in the middle
Downtime
Anti-virus
White hat hacker
Financial gain