biometriclocktrojanhorseDDoSSpoofingadwarespamsecurityPolicyDNSPoisoningTailgatingphishingbaitingviruszero-daysignaturefileShoulderSurfingzero-hourReplaytoken-basedlockSocialEngineeringMantrapSynFloodwormreconnaisaanceconventionallockspearphishingspywareelectroniclockMan-in-the-MiddleDoSdeadboltlockransomwarerootkitImpersonationDumpsterdivingbiometriclocktrojanhorseDDoSSpoofingadwarespamsecurityPolicyDNSPoisoningTailgatingphishingbaitingviruszero-daysignaturefileShoulderSurfingzero-hourReplaytoken-basedlockSocialEngineeringMantrapSynFloodwormreconnaisaanceconventionallockspearphishingspywareelectroniclockMan-in-the-MiddleDoSdeadboltlockransomwarerootkitImpersonationDumpsterdiving

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. biometric lock
  2. trojan horse
  3. DDoS
  4. Spoofing
  5. adware
  6. spam
  7. security Policy
  8. DNS Poisoning
  9. Tailgating
  10. phishing
  11. baiting
  12. virus
  13. zero-day
  14. signature file
  15. Shoulder Surfing
  16. zero-hour
  17. Replay
  18. token-based lock
  19. Social Engineering
  20. Mantrap
  21. Syn Flood
  22. worm
  23. reconnaisaance
  24. conventional lock
  25. spear phishing
  26. spyware
  27. electronic lock
  28. Man-in-the-Middle
  29. DoS
  30. deadbolt lock
  31. ransomware
  32. rootkit
  33. Impersonation
  34. Dumpster diving