DDoSransomwareImpersonationspywarerootkitzero-dayspearphishingconventionallocktoken-basedlockbiometriclockspamadwareDumpsterdivingbaitingTailgatingMan-in-the-MiddleSocialEngineeringzero-hourDoSShoulderSurfingSynFloodphishingMantrapreconnaisaancesecurityPolicywormelectroniclockSpoofingvirusdeadboltlocktrojanhorseReplaysignaturefileDNSPoisoningDDoSransomwareImpersonationspywarerootkitzero-dayspearphishingconventionallocktoken-basedlockbiometriclockspamadwareDumpsterdivingbaitingTailgatingMan-in-the-MiddleSocialEngineeringzero-hourDoSShoulderSurfingSynFloodphishingMantrapreconnaisaancesecurityPolicywormelectroniclockSpoofingvirusdeadboltlocktrojanhorseReplaysignaturefileDNSPoisoning

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. DDoS
  2. ransomware
  3. Impersonation
  4. spyware
  5. rootkit
  6. zero-day
  7. spear phishing
  8. conventional lock
  9. token-based lock
  10. biometric lock
  11. spam
  12. adware
  13. Dumpster diving
  14. baiting
  15. Tailgating
  16. Man-in-the-Middle
  17. Social Engineering
  18. zero-hour
  19. DoS
  20. Shoulder Surfing
  21. Syn Flood
  22. phishing
  23. Mantrap
  24. reconnaisaance
  25. security Policy
  26. worm
  27. electronic lock
  28. Spoofing
  29. virus
  30. deadbolt lock
  31. trojan horse
  32. Replay
  33. signature file
  34. DNS Poisoning