AdwareJavaScriptJavaDoSAttackVirusSSIDDNSPoisoningTrojanHorseSpoofingBIOSWormActiveXMan-in-the MiddleattackDataWipingSpamSYNFloodAttackInternalPing ofDeathReplayAttackE-mailBombPhishingExternalSpywareDDoSAttackAdwareJavaScriptJavaDoSAttackVirusSSIDDNSPoisoningTrojanHorseSpoofingBIOSWormActiveXMan-in-the MiddleattackDataWipingSpamSYNFloodAttackInternalPing ofDeathReplayAttackE-mailBombPhishingExternalSpywareDDoSAttack

Chapter 9: Secruity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Adware
  2. Java Script
  3. Java
  4. DoS Attack
  5. Virus
  6. SSID
  7. DNS Poisoning
  8. Trojan Horse
  9. Spoofing
  10. BIOS
  11. Worm
  12. ActiveX
  13. Man-in-the Middle attack
  14. Data Wiping
  15. Spam
  16. SYN Flood Attack
  17. Internal
  18. Ping of Death
  19. Replay Attack
  20. E-mail Bomb
  21. Phishing
  22. External
  23. Spyware
  24. DDoS Attack