trojan horse rootkit zero- day electronic lock token- based lock DNS Poisoning zero- hour phishing Syn Flood adware conventional lock DoS deadbolt lock Mantrap spyware spear phishing security Policy Tailgating Shoulder Surfing Social Engineering Spoofing virus Impersonation ransomware Replay worm Dumpster diving DDoS signature file baiting reconnaisaance spam Man- in-the- Middle biometric lock trojan horse rootkit zero- day electronic lock token- based lock DNS Poisoning zero- hour phishing Syn Flood adware conventional lock DoS deadbolt lock Mantrap spyware spear phishing security Policy Tailgating Shoulder Surfing Social Engineering Spoofing virus Impersonation ransomware Replay worm Dumpster diving DDoS signature file baiting reconnaisaance spam Man- in-the- Middle biometric lock
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
trojan horse
rootkit
zero-day
electronic lock
token-based lock
DNS Poisoning
zero-hour
phishing
Syn Flood
adware
conventional lock
DoS
deadbolt lock
Mantrap
spyware
spear phishing
security Policy
Tailgating
Shoulder Surfing
Social Engineering
Spoofing
virus
Impersonation
ransomware
Replay
worm
Dumpster diving
DDoS
signature file
baiting
reconnaisaance
spam
Man-in-the-Middle
biometric lock