phishingwormDoSsignaturefiletoken-basedlockMantrapspearphishingReplaybiometriclockelectroniclockImpersonationMan-in-the-MiddlespamDDoSvirusreconnaisaancerootkitzero-dayDNSPoisoningspywaretrojanhorseSpoofingShoulderSurfingSocialEngineeringadwareSynFloodTailgatingsecurityPolicydeadboltlockzero-hourransomwarebaitingDumpsterdivingconventionallockphishingwormDoSsignaturefiletoken-basedlockMantrapspearphishingReplaybiometriclockelectroniclockImpersonationMan-in-the-MiddlespamDDoSvirusreconnaisaancerootkitzero-dayDNSPoisoningspywaretrojanhorseSpoofingShoulderSurfingSocialEngineeringadwareSynFloodTailgatingsecurityPolicydeadboltlockzero-hourransomwarebaitingDumpsterdivingconventionallock

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. phishing
  2. worm
  3. DoS
  4. signature file
  5. token-based lock
  6. Mantrap
  7. spear phishing
  8. Replay
  9. biometric lock
  10. electronic lock
  11. Impersonation
  12. Man-in-the-Middle
  13. spam
  14. DDoS
  15. virus
  16. reconnaisaance
  17. rootkit
  18. zero-day
  19. DNS Poisoning
  20. spyware
  21. trojan horse
  22. Spoofing
  23. Shoulder Surfing
  24. Social Engineering
  25. adware
  26. Syn Flood
  27. Tailgating
  28. security Policy
  29. deadbolt lock
  30. zero-hour
  31. ransomware
  32. baiting
  33. Dumpster diving
  34. conventional lock