trojanhorseSynFloodsignaturefilevirusrootkitShoulderSurfingbiometriclocksecurityPolicyelectroniclockadwareTailgatingtoken-basedlockzero-dayzero-hourImpersonationDoSwormdeadboltlockransomwareMantrapphishingDNSPoisoningconventionallockspearphishingSpoofingMan-in-the-MiddlespamDDoSbaitingDumpsterdivingSocialEngineeringReplayspywarereconnaisaancetrojanhorseSynFloodsignaturefilevirusrootkitShoulderSurfingbiometriclocksecurityPolicyelectroniclockadwareTailgatingtoken-basedlockzero-dayzero-hourImpersonationDoSwormdeadboltlockransomwareMantrapphishingDNSPoisoningconventionallockspearphishingSpoofingMan-in-the-MiddlespamDDoSbaitingDumpsterdivingSocialEngineeringReplayspywarereconnaisaance

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. trojan horse
  2. Syn Flood
  3. signature file
  4. virus
  5. rootkit
  6. Shoulder Surfing
  7. biometric lock
  8. security Policy
  9. electronic lock
  10. adware
  11. Tailgating
  12. token-based lock
  13. zero-day
  14. zero-hour
  15. Impersonation
  16. DoS
  17. worm
  18. deadbolt lock
  19. ransomware
  20. Mantrap
  21. phishing
  22. DNS Poisoning
  23. conventional lock
  24. spear phishing
  25. Spoofing
  26. Man-in-the-Middle
  27. spam
  28. DDoS
  29. baiting
  30. Dumpster diving
  31. Social Engineering
  32. Replay
  33. spyware
  34. reconnaisaance