FirewallEmail-AnhangChattenSasser-WurmSocial-EngineeringFrauenfußballCrackerAnti-Hacker-BuchPhishingSpamKeyloggerAgentHotspotMassen-angriffHinterein-ander-schaltungHacker-programmIndustrie-spionageSniffer-ProgrammIDSTrojanerPenetration-TestDOS-AngriffBSIViren-programmPaaaswortFirewallEmail-AnhangChattenSasser-WurmSocial-EngineeringFrauenfußballCrackerAnti-Hacker-BuchPhishingSpamKeyloggerAgentHotspotMassen-angriffHinterein-ander-schaltungHacker-programmIndustrie-spionageSniffer-ProgrammIDSTrojanerPenetration-TestDOS-AngriffBSIViren-programmPaaaswort

IT Management Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Firewall
  2. Email-Anhang
  3. Chatten
  4. Sasser- Wurm
  5. Social-Engineering
  6. Frauenfußball
  7. Cracker
  8. Anti-Hacker-Buch
  9. Phishing
  10. Spam
  11. Keylogger
  12. Agent
  13. Hotspot
  14. Massen-angriff
  15. Hinterein-ander-schaltung
  16. Hacker-programm
  17. Industrie-spionage
  18. Sniffer-Programm
  19. IDS
  20. Trojaner
  21. Penetration-Test
  22. DOS-Angriff
  23. BSI
  24. Viren-programm
  25. Paaaswort