Anti-Hacker-BuchIndustriespionageSasser-WurmSniffer-ProgrammDOS-AngriffEmail-AnhangSpamBSIFirewallIDSHintereinanderschaltungVirenprogrammSicherheitslückePenetration-TestMassenangriffCrackerPaaaswortAgentFrauenfußballKeyloggerSocial-EngineeringHackerprogrammVirenjägerTrojanerPhishingAnti-Hacker-BuchIndustriespionageSasser-WurmSniffer-ProgrammDOS-AngriffEmail-AnhangSpamBSIFirewallIDSHintereinanderschaltungVirenprogrammSicherheitslückePenetration-TestMassenangriffCrackerPaaaswortAgentFrauenfußballKeyloggerSocial-EngineeringHackerprogrammVirenjägerTrojanerPhishing

IT Management Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Anti-Hacker-Buch
  2. Industriespionage
  3. Sasser- Wurm
  4. Sniffer-Programm
  5. DOS-Angriff
  6. Email-Anhang
  7. Spam
  8. BSI
  9. Firewall
  10. IDS
  11. Hintereinanderschaltung
  12. Virenprogramm
  13. Sicherheitslücke
  14. Penetration-Test
  15. Massenangriff
  16. Cracker
  17. Paaaswort
  18. Agent
  19. Frauenfußball
  20. Keylogger
  21. Social-Engineering
  22. Hackerprogramm
  23. Virenjäger
  24. Trojaner
  25. Phishing