phishing worm DoS signature file token- based lock Mantrap spear phishing Replay biometric lock electronic lock Impersonation Man- in-the- Middle spam DDoS virus reconnaisaance rootkit zero- day DNS Poisoning spyware trojan horse Spoofing Shoulder Surfing Social Engineering adware Syn Flood Tailgating security Policy deadbolt lock zero- hour ransomware baiting Dumpster diving conventional lock phishing worm DoS signature file token- based lock Mantrap spear phishing Replay biometric lock electronic lock Impersonation Man- in-the- Middle spam DDoS virus reconnaisaance rootkit zero- day DNS Poisoning spyware trojan horse Spoofing Shoulder Surfing Social Engineering adware Syn Flood Tailgating security Policy deadbolt lock zero- hour ransomware baiting Dumpster diving conventional lock
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
phishing
worm
DoS
signature file
token-based lock
Mantrap
spear phishing
Replay
biometric lock
electronic lock
Impersonation
Man-in-the-Middle
spam
DDoS
virus
reconnaisaance
rootkit
zero-day
DNS Poisoning
spyware
trojan horse
Spoofing
Shoulder Surfing
Social Engineering
adware
Syn Flood
Tailgating
security Policy
deadbolt lock
zero-hour
ransomware
baiting
Dumpster diving
conventional lock