ImpersonationMan-in-the-MiddleDumpsterdivingsecurityPolicyDDoSTailgatingreconnaisaanceransomwarespamadwaresignaturefilebaitingSynFloodDNSPoisoningvirusphishingbiometriclockSpoofingspywaretrojanhorseShoulderSurfingDoSwormReplayelectroniclockzero-dayconventionallockMantrapzero-hourrootkittoken-basedlockdeadboltlockspearphishingSocialEngineeringImpersonationMan-in-the-MiddleDumpsterdivingsecurityPolicyDDoSTailgatingreconnaisaanceransomwarespamadwaresignaturefilebaitingSynFloodDNSPoisoningvirusphishingbiometriclockSpoofingspywaretrojanhorseShoulderSurfingDoSwormReplayelectroniclockzero-dayconventionallockMantrapzero-hourrootkittoken-basedlockdeadboltlockspearphishingSocialEngineering

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. Impersonation
  2. Man-in-the-Middle
  3. Dumpster diving
  4. security Policy
  5. DDoS
  6. Tailgating
  7. reconnaisaance
  8. ransomware
  9. spam
  10. adware
  11. signature file
  12. baiting
  13. Syn Flood
  14. DNS Poisoning
  15. virus
  16. phishing
  17. biometric lock
  18. Spoofing
  19. spyware
  20. trojan horse
  21. Shoulder Surfing
  22. DoS
  23. worm
  24. Replay
  25. electronic lock
  26. zero-day
  27. conventional lock
  28. Mantrap
  29. zero-hour
  30. rootkit
  31. token-based lock
  32. deadbolt lock
  33. spear phishing
  34. Social Engineering