Impersonation Man- in-the- Middle Dumpster diving security Policy DDoS Tailgating reconnaisaance ransomware spam adware signature file baiting Syn Flood DNS Poisoning virus phishing biometric lock Spoofing spyware trojan horse Shoulder Surfing DoS worm Replay electronic lock zero- day conventional lock Mantrap zero- hour rootkit token- based lock deadbolt lock spear phishing Social Engineering Impersonation Man- in-the- Middle Dumpster diving security Policy DDoS Tailgating reconnaisaance ransomware spam adware signature file baiting Syn Flood DNS Poisoning virus phishing biometric lock Spoofing spyware trojan horse Shoulder Surfing DoS worm Replay electronic lock zero- day conventional lock Mantrap zero- hour rootkit token- based lock deadbolt lock spear phishing Social Engineering
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Impersonation
Man-in-the-Middle
Dumpster diving
security Policy
DDoS
Tailgating
reconnaisaance
ransomware
spam
adware
signature file
baiting
Syn Flood
DNS Poisoning
virus
phishing
biometric lock
Spoofing
spyware
trojan horse
Shoulder Surfing
DoS
worm
Replay
electronic lock
zero-day
conventional lock
Mantrap
zero-hour
rootkit
token-based lock
deadbolt lock
spear phishing
Social Engineering