Email-AnhangPhishingPaaaswortSasser-WurmAgentBSIDOS-AngriffKeyloggerFirewallChattenMassen-angriffCrackerSpamPenetration-TestSniffer-ProgrammAnti-Hacker-BuchHotspotHacker-programmHinterein-ander-schaltungIDSTrojanerFrauenfußballSocial-EngineeringIndustrie-spionageViren-programmEmail-AnhangPhishingPaaaswortSasser-WurmAgentBSIDOS-AngriffKeyloggerFirewallChattenMassen-angriffCrackerSpamPenetration-TestSniffer-ProgrammAnti-Hacker-BuchHotspotHacker-programmHinterein-ander-schaltungIDSTrojanerFrauenfußballSocial-EngineeringIndustrie-spionageViren-programm

IT Management Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Email-Anhang
  2. Phishing
  3. Paaaswort
  4. Sasser- Wurm
  5. Agent
  6. BSI
  7. DOS-Angriff
  8. Keylogger
  9. Firewall
  10. Chatten
  11. Massen-angriff
  12. Cracker
  13. Spam
  14. Penetration-Test
  15. Sniffer-Programm
  16. Anti-Hacker-Buch
  17. Hotspot
  18. Hacker-programm
  19. Hinterein-ander-schaltung
  20. IDS
  21. Trojaner
  22. Frauenfußball
  23. Social-Engineering
  24. Industrie-spionage
  25. Viren-programm