ransomwareSynFloodImpersonationSocialEngineeringsecurityPolicyrootkitDDoSDNSPoisoningphishingMantrapspywaredeadboltlockReplaysignaturefilezero-dayspamDumpsterdivingtrojanhorsewormSpoofingbiometriclocktoken-basedlockbaitingShoulderSurfingelectroniclockMan-in-the-MiddleadwarespearphishingconventionallockDoSTailgatingreconnaisaanceviruszero-hourransomwareSynFloodImpersonationSocialEngineeringsecurityPolicyrootkitDDoSDNSPoisoningphishingMantrapspywaredeadboltlockReplaysignaturefilezero-dayspamDumpsterdivingtrojanhorsewormSpoofingbiometriclocktoken-basedlockbaitingShoulderSurfingelectroniclockMan-in-the-MiddleadwarespearphishingconventionallockDoSTailgatingreconnaisaanceviruszero-hour

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. ransomware
  2. Syn Flood
  3. Impersonation
  4. Social Engineering
  5. security Policy
  6. rootkit
  7. DDoS
  8. DNS Poisoning
  9. phishing
  10. Mantrap
  11. spyware
  12. deadbolt lock
  13. Replay
  14. signature file
  15. zero-day
  16. spam
  17. Dumpster diving
  18. trojan horse
  19. worm
  20. Spoofing
  21. biometric lock
  22. token-based lock
  23. baiting
  24. Shoulder Surfing
  25. electronic lock
  26. Man-in-the-Middle
  27. adware
  28. spear phishing
  29. conventional lock
  30. DoS
  31. Tailgating
  32. reconnaisaance
  33. virus
  34. zero-hour