trojanhorserootkitzero-dayelectroniclocktoken-basedlockDNSPoisoningzero-hourphishingSynFloodadwareconventionallockDoSdeadboltlockMantrapspywarespearphishingsecurityPolicyTailgatingShoulderSurfingSocialEngineeringSpoofingvirusImpersonationransomwareReplaywormDumpsterdivingDDoSsignaturefilebaitingreconnaisaancespamMan-in-the-Middlebiometriclocktrojanhorserootkitzero-dayelectroniclocktoken-basedlockDNSPoisoningzero-hourphishingSynFloodadwareconventionallockDoSdeadboltlockMantrapspywarespearphishingsecurityPolicyTailgatingShoulderSurfingSocialEngineeringSpoofingvirusImpersonationransomwareReplaywormDumpsterdivingDDoSsignaturefilebaitingreconnaisaancespamMan-in-the-Middlebiometriclock

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. trojan horse
  2. rootkit
  3. zero-day
  4. electronic lock
  5. token-based lock
  6. DNS Poisoning
  7. zero-hour
  8. phishing
  9. Syn Flood
  10. adware
  11. conventional lock
  12. DoS
  13. deadbolt lock
  14. Mantrap
  15. spyware
  16. spear phishing
  17. security Policy
  18. Tailgating
  19. Shoulder Surfing
  20. Social Engineering
  21. Spoofing
  22. virus
  23. Impersonation
  24. ransomware
  25. Replay
  26. worm
  27. Dumpster diving
  28. DDoS
  29. signature file
  30. baiting
  31. reconnaisaance
  32. spam
  33. Man-in-the-Middle
  34. biometric lock