biometric lock trojan horse DDoS Spoofing adware spam security Policy DNS Poisoning Tailgating phishing baiting virus zero- day signature file Shoulder Surfing zero- hour Replay token- based lock Social Engineering Mantrap Syn Flood worm reconnaisaance conventional lock spear phishing spyware electronic lock Man- in-the- Middle DoS deadbolt lock ransomware rootkit Impersonation Dumpster diving biometric lock trojan horse DDoS Spoofing adware spam security Policy DNS Poisoning Tailgating phishing baiting virus zero- day signature file Shoulder Surfing zero- hour Replay token- based lock Social Engineering Mantrap Syn Flood worm reconnaisaance conventional lock spear phishing spyware electronic lock Man- in-the- Middle DoS deadbolt lock ransomware rootkit Impersonation Dumpster diving
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
biometric lock
trojan horse
DDoS
Spoofing
adware
spam
security Policy
DNS Poisoning
Tailgating
phishing
baiting
virus
zero-day
signature file
Shoulder Surfing
zero-hour
Replay
token-based lock
Social Engineering
Mantrap
Syn Flood
worm
reconnaisaance
conventional lock
spear phishing
spyware
electronic lock
Man-in-the-Middle
DoS
deadbolt lock
ransomware
rootkit
Impersonation
Dumpster diving