zero- hour Man- in-the- Middle DNS Poisoning spear phishing rootkit token- based lock Syn Flood virus Dumpster diving spam Social Engineering worm reconnaisaance signature file trojan horse deadbolt lock Tailgating DoS spyware biometric lock DDoS Mantrap baiting Impersonation zero- day Shoulder Surfing adware Spoofing conventional lock electronic lock phishing ransomware security Policy Replay zero- hour Man- in-the- Middle DNS Poisoning spear phishing rootkit token- based lock Syn Flood virus Dumpster diving spam Social Engineering worm reconnaisaance signature file trojan horse deadbolt lock Tailgating DoS spyware biometric lock DDoS Mantrap baiting Impersonation zero- day Shoulder Surfing adware Spoofing conventional lock electronic lock phishing ransomware security Policy Replay
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
zero-hour
Man-in-the-Middle
DNS Poisoning
spear phishing
rootkit
token-based lock
Syn Flood
virus
Dumpster diving
spam
Social Engineering
worm
reconnaisaance
signature file
trojan horse
deadbolt lock
Tailgating
DoS
spyware
biometric lock
DDoS
Mantrap
baiting
Impersonation
zero-day
Shoulder Surfing
adware
Spoofing
conventional lock
electronic lock
phishing
ransomware
security Policy
Replay