PhishingDataWipingTrojanHorseActiveXSpywareSpoofingE-mailBombSpamPing ofDeathSSIDInternalDoSAttackBIOSReplayAttackWormDNSPoisoningExternalDDoSAttackJavaScriptAdwareJavaMan-in-the MiddleattackVirusSYNFloodAttackPhishingDataWipingTrojanHorseActiveXSpywareSpoofingE-mailBombSpamPing ofDeathSSIDInternalDoSAttackBIOSReplayAttackWormDNSPoisoningExternalDDoSAttackJavaScriptAdwareJavaMan-in-the MiddleattackVirusSYNFloodAttack

Chapter 9: Secruity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Phishing
  2. Data Wiping
  3. Trojan Horse
  4. ActiveX
  5. Spyware
  6. Spoofing
  7. E-mail Bomb
  8. Spam
  9. Ping of Death
  10. SSID
  11. Internal
  12. DoS Attack
  13. BIOS
  14. Replay Attack
  15. Worm
  16. DNS Poisoning
  17. External
  18. DDoS Attack
  19. Java Script
  20. Adware
  21. Java
  22. Man-in-the Middle attack
  23. Virus
  24. SYN Flood Attack