zero-hourMan-in-the-MiddleDNSPoisoningspearphishingrootkittoken-basedlockSynFloodvirusDumpsterdivingspamSocialEngineeringwormreconnaisaancesignaturefiletrojanhorsedeadboltlockTailgatingDoSspywarebiometriclockDDoSMantrapbaitingImpersonationzero-dayShoulderSurfingadwareSpoofingconventionallockelectroniclockphishingransomwaresecurityPolicyReplayzero-hourMan-in-the-MiddleDNSPoisoningspearphishingrootkittoken-basedlockSynFloodvirusDumpsterdivingspamSocialEngineeringwormreconnaisaancesignaturefiletrojanhorsedeadboltlockTailgatingDoSspywarebiometriclockDDoSMantrapbaitingImpersonationzero-dayShoulderSurfingadwareSpoofingconventionallockelectroniclockphishingransomwaresecurityPolicyReplay

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. zero-hour
  2. Man-in-the-Middle
  3. DNS Poisoning
  4. spear phishing
  5. rootkit
  6. token-based lock
  7. Syn Flood
  8. virus
  9. Dumpster diving
  10. spam
  11. Social Engineering
  12. worm
  13. reconnaisaance
  14. signature file
  15. trojan horse
  16. deadbolt lock
  17. Tailgating
  18. DoS
  19. spyware
  20. biometric lock
  21. DDoS
  22. Mantrap
  23. baiting
  24. Impersonation
  25. zero-day
  26. Shoulder Surfing
  27. adware
  28. Spoofing
  29. conventional lock
  30. electronic lock
  31. phishing
  32. ransomware
  33. security Policy
  34. Replay