DDoS ransomware Impersonation spyware rootkit zero- day spear phishing conventional lock token- based lock biometric lock spam adware Dumpster diving baiting Tailgating Man- in-the- Middle Social Engineering zero- hour DoS Shoulder Surfing Syn Flood phishing Mantrap reconnaisaance security Policy worm electronic lock Spoofing virus deadbolt lock trojan horse Replay signature file DNS Poisoning DDoS ransomware Impersonation spyware rootkit zero- day spear phishing conventional lock token- based lock biometric lock spam adware Dumpster diving baiting Tailgating Man- in-the- Middle Social Engineering zero- hour DoS Shoulder Surfing Syn Flood phishing Mantrap reconnaisaance security Policy worm electronic lock Spoofing virus deadbolt lock trojan horse Replay signature file DNS Poisoning
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DDoS
ransomware
Impersonation
spyware
rootkit
zero-day
spear phishing
conventional lock
token-based lock
biometric lock
spam
adware
Dumpster diving
baiting
Tailgating
Man-in-the-Middle
Social Engineering
zero-hour
DoS
Shoulder Surfing
Syn Flood
phishing
Mantrap
reconnaisaance
security Policy
worm
electronic lock
Spoofing
virus
deadbolt lock
trojan horse
Replay
signature file
DNS Poisoning