trojan horse Syn Flood signature file virus rootkit Shoulder Surfing biometric lock security Policy electronic lock adware Tailgating token- based lock zero- day zero- hour Impersonation DoS worm deadbolt lock ransomware Mantrap phishing DNS Poisoning conventional lock spear phishing Spoofing Man- in-the- Middle spam DDoS baiting Dumpster diving Social Engineering Replay spyware reconnaisaance trojan horse Syn Flood signature file virus rootkit Shoulder Surfing biometric lock security Policy electronic lock adware Tailgating token- based lock zero- day zero- hour Impersonation DoS worm deadbolt lock ransomware Mantrap phishing DNS Poisoning conventional lock spear phishing Spoofing Man- in-the- Middle spam DDoS baiting Dumpster diving Social Engineering Replay spyware reconnaisaance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
trojan horse
Syn Flood
signature file
virus
rootkit
Shoulder Surfing
biometric lock
security Policy
electronic lock
adware
Tailgating
token-based lock
zero-day
zero-hour
Impersonation
DoS
worm
deadbolt lock
ransomware
Mantrap
phishing
DNS Poisoning
conventional lock
spear phishing
Spoofing
Man-in-the-Middle
spam
DDoS
baiting
Dumpster diving
Social Engineering
Replay
spyware
reconnaisaance