This bingo card has a free space and 24 words: Tracks your location through a legal but unwanted app feature, Sends fake texts to trick users into giving info, Unauthorized Wi-Fi that imitates a real hotspot, Short-range wireless tech attacked by Bluejacking, Interferes with a wireless signal using matching frequencies, When Bluetooth is used to steal data like contacts, Device added to network without permission, Uses fake Wi-Fi to capture login info, Annoying but not truly malicious software, Discovers rogue access points in a network, A text phishing attack method, Unauthorized wireless point installed on a secure network, Encryption helps protect this kind of communication, Interrupts signal by matching frequency and power, Sends shocking images via Bluetooth, Policy needed for guest Wi-Fi access, VPNs protect against public Wi-Fi risks, Occurs when attacker copies info via Bluetooth, Social engineering lets attackers install this on networks, Adds unapproved capabilities hidden in user agreements, Attack using café Wi-Fi imitation, Tool used to find unauthorized devices, De-authentication spoofing can start this attack and Uses short-range pairing between devices.
RTS Chat | UMA IT Cybersecurity Bingo | Security Bingo | Foundations of Tech Bingo | PACS
Share this URL with your players:
For more control of your online game, create a clone of this card first.
Learn how to conduct a bingo game.
With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.
Tip: If you want your game to last longer (on average), add more unique words/images to it.