ReplayDumpsterdivingphishingShoulderSurfingImpersonationDoSspearphishingransomwaretoken-basedlockDNSPoisoningsignaturefileMan-in-the-MiddleSynFloodDDoSSocialEngineeringspambaitingadwareelectroniclockwormMantrapbiometriclockSpoofingTailgatingspywarezero-hourconventionallockviruszero-dayreconnaisaancetrojanhorserootkitsecurityPolicydeadboltlockReplayDumpsterdivingphishingShoulderSurfingImpersonationDoSspearphishingransomwaretoken-basedlockDNSPoisoningsignaturefileMan-in-the-MiddleSynFloodDDoSSocialEngineeringspambaitingadwareelectroniclockwormMantrapbiometriclockSpoofingTailgatingspywarezero-hourconventionallockviruszero-dayreconnaisaancetrojanhorserootkitsecurityPolicydeadboltlock

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. Replay
  2. Dumpster diving
  3. phishing
  4. Shoulder Surfing
  5. Impersonation
  6. DoS
  7. spear phishing
  8. ransomware
  9. token-based lock
  10. DNS Poisoning
  11. signature file
  12. Man-in-the-Middle
  13. Syn Flood
  14. DDoS
  15. Social Engineering
  16. spam
  17. baiting
  18. adware
  19. electronic lock
  20. worm
  21. Mantrap
  22. biometric lock
  23. Spoofing
  24. Tailgating
  25. spyware
  26. zero-hour
  27. conventional lock
  28. virus
  29. zero-day
  30. reconnaisaance
  31. trojan horse
  32. rootkit
  33. security Policy
  34. deadbolt lock