SpamAgentFrauenfußballChattenSasser-WurmKeyloggerBSISniffer-ProgrammPhishingTrojanerMassen-angriffHotspotFirewallPenetration-TestHinterein-ander-schaltungHacker-programmEmail-AnhangIDSViren-programmIndustrie-spionageCrackerPaaaswortDOS-AngriffAnti-Hacker-BuchSocial-EngineeringSpamAgentFrauenfußballChattenSasser-WurmKeyloggerBSISniffer-ProgrammPhishingTrojanerMassen-angriffHotspotFirewallPenetration-TestHinterein-ander-schaltungHacker-programmEmail-AnhangIDSViren-programmIndustrie-spionageCrackerPaaaswortDOS-AngriffAnti-Hacker-BuchSocial-Engineering

IT Management Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Spam
  2. Agent
  3. Frauenfußball
  4. Chatten
  5. Sasser- Wurm
  6. Keylogger
  7. BSI
  8. Sniffer-Programm
  9. Phishing
  10. Trojaner
  11. Massen-angriff
  12. Hotspot
  13. Firewall
  14. Penetration-Test
  15. Hinterein-ander-schaltung
  16. Hacker-programm
  17. Email-Anhang
  18. IDS
  19. Viren-programm
  20. Industrie-spionage
  21. Cracker
  22. Paaaswort
  23. DOS-Angriff
  24. Anti-Hacker-Buch
  25. Social-Engineering