Anti-Hacker-BuchFirewallIDSVirenprogrammSocial-EngineeringSpamSniffer-ProgrammFrauenfußballDOS-AngriffPaaaswortTrojanerSicherheitslückeSasser-WurmAgentPhishingMassenangriffCrackerHintereinanderschaltungPenetration-TestKeyloggerHackerprogrammVirenjägerEmail-AnhangIndustriespionageWurmBSIAnti-Hacker-BuchFirewallIDSVirenprogrammSocial-EngineeringSpamSniffer-ProgrammFrauenfußballDOS-AngriffPaaaswortTrojanerSicherheitslückeSasser-WurmAgentPhishingMassenangriffCrackerHintereinanderschaltungPenetration-TestKeyloggerHackerprogrammVirenjägerEmail-AnhangIndustriespionageWurmBSI

IT Management Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Anti-Hacker-Buch
  2. Firewall
  3. IDS
  4. Virenprogramm
  5. Social-Engineering
  6. Spam
  7. Sniffer-Programm
  8. Frauenfußball
  9. DOS-Angriff
  10. Paaaswort
  11. Trojaner
  12. Sicherheitslücke
  13. Sasser- Wurm
  14. Agent
  15. Phishing
  16. Massenangriff
  17. Cracker
  18. Hintereinanderschaltung
  19. Penetration-Test
  20. Keylogger
  21. Hackerprogramm
  22. Virenjäger
  23. Email-Anhang
  24. Industriespionage
  25. Wurm
  26. BSI