ChattenSasser-WurmBSIDOS-AngriffAnti-Hacker-BuchIndustrie-spionagePaaaswortHinterein-ander-schaltungAgentFirewallHacker-programmSniffer-ProgrammCrackerPhishingTrojanerMassen-angriffSpamPenetration-TestKeyloggerEmail-AnhangIDSSocial-EngineeringHotspotViren-programmFrauenfußballChattenSasser-WurmBSIDOS-AngriffAnti-Hacker-BuchIndustrie-spionagePaaaswortHinterein-ander-schaltungAgentFirewallHacker-programmSniffer-ProgrammCrackerPhishingTrojanerMassen-angriffSpamPenetration-TestKeyloggerEmail-AnhangIDSSocial-EngineeringHotspotViren-programmFrauenfußball

IT Management Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Chatten
  2. Sasser- Wurm
  3. BSI
  4. DOS-Angriff
  5. Anti-Hacker-Buch
  6. Industrie-spionage
  7. Paaaswort
  8. Hinterein-ander-schaltung
  9. Agent
  10. Firewall
  11. Hacker-programm
  12. Sniffer-Programm
  13. Cracker
  14. Phishing
  15. Trojaner
  16. Massen-angriff
  17. Spam
  18. Penetration-Test
  19. Keylogger
  20. Email-Anhang
  21. IDS
  22. Social-Engineering
  23. Hotspot
  24. Viren-programm
  25. Frauenfußball