ransomware Syn Flood Impersonation Social Engineering security Policy rootkit DDoS DNS Poisoning phishing Mantrap spyware deadbolt lock Replay signature file zero- day spam Dumpster diving trojan horse worm Spoofing biometric lock token- based lock baiting Shoulder Surfing electronic lock Man- in-the- Middle adware spear phishing conventional lock DoS Tailgating reconnaisaance virus zero- hour ransomware Syn Flood Impersonation Social Engineering security Policy rootkit DDoS DNS Poisoning phishing Mantrap spyware deadbolt lock Replay signature file zero- day spam Dumpster diving trojan horse worm Spoofing biometric lock token- based lock baiting Shoulder Surfing electronic lock Man- in-the- Middle adware spear phishing conventional lock DoS Tailgating reconnaisaance virus zero- hour
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
ransomware
Syn Flood
Impersonation
Social Engineering
security Policy
rootkit
DDoS
DNS Poisoning
phishing
Mantrap
spyware
deadbolt lock
Replay
signature file
zero-day
spam
Dumpster diving
trojan horse
worm
Spoofing
biometric lock
token-based lock
baiting
Shoulder Surfing
electronic lock
Man-in-the-Middle
adware
spear phishing
conventional lock
DoS
Tailgating
reconnaisaance
virus
zero-hour