zero-dayReplaySocialEngineeringspywareTailgatingShoulderSurfingbiometriclockDumpsterdivingMantrapwormDDoSspamdeadboltlockSynFloodsecurityPolicySpoofingreconnaisaanceelectroniclockphishingImpersonationDoSzero-hourspearphishingtoken-basedlockDNSPoisoningtrojanhorsesignaturefileransomwarebaitingvirusadwarerootkitMan-in-the-Middleconventionallockzero-dayReplaySocialEngineeringspywareTailgatingShoulderSurfingbiometriclockDumpsterdivingMantrapwormDDoSspamdeadboltlockSynFloodsecurityPolicySpoofingreconnaisaanceelectroniclockphishingImpersonationDoSzero-hourspearphishingtoken-basedlockDNSPoisoningtrojanhorsesignaturefileransomwarebaitingvirusadwarerootkitMan-in-the-Middleconventionallock

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. zero-day
  2. Replay
  3. Social Engineering
  4. spyware
  5. Tailgating
  6. Shoulder Surfing
  7. biometric lock
  8. Dumpster diving
  9. Mantrap
  10. worm
  11. DDoS
  12. spam
  13. deadbolt lock
  14. Syn Flood
  15. security Policy
  16. Spoofing
  17. reconnaisaance
  18. electronic lock
  19. phishing
  20. Impersonation
  21. DoS
  22. zero-hour
  23. spear phishing
  24. token-based lock
  25. DNS Poisoning
  26. trojan horse
  27. signature file
  28. ransomware
  29. baiting
  30. virus
  31. adware
  32. rootkit
  33. Man-in-the-Middle
  34. conventional lock