deadboltlockImpersonationphishingconventionallockvirusDNSPoisoningzero-hoursecurityPolicyelectroniclockadwareTailgatingbaitingtrojanhorsespamsignaturefilereconnaisaancespearphishingwormDDoStoken-basedlockDoSMantrapShoulderSurfingDumpsterdivingrootkitReplaySynFloodspywareMan-in-the-MiddlebiometriclockSocialEngineeringransomwareSpoofingzero-daydeadboltlockImpersonationphishingconventionallockvirusDNSPoisoningzero-hoursecurityPolicyelectroniclockadwareTailgatingbaitingtrojanhorsespamsignaturefilereconnaisaancespearphishingwormDDoStoken-basedlockDoSMantrapShoulderSurfingDumpsterdivingrootkitReplaySynFloodspywareMan-in-the-MiddlebiometriclockSocialEngineeringransomwareSpoofingzero-day

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. deadbolt lock
  2. Impersonation
  3. phishing
  4. conventional lock
  5. virus
  6. DNS Poisoning
  7. zero-hour
  8. security Policy
  9. electronic lock
  10. adware
  11. Tailgating
  12. baiting
  13. trojan horse
  14. spam
  15. signature file
  16. reconnaisaance
  17. spear phishing
  18. worm
  19. DDoS
  20. token-based lock
  21. DoS
  22. Mantrap
  23. Shoulder Surfing
  24. Dumpster diving
  25. rootkit
  26. Replay
  27. Syn Flood
  28. spyware
  29. Man-in-the-Middle
  30. biometric lock
  31. Social Engineering
  32. ransomware
  33. Spoofing
  34. zero-day