InternalPing ofDeathDDoSAttackAdwareDNSPoisoningVirusPhishingE-mailBombDoSAttackSpoofingJavaScriptMan-in-the MiddleattackExternalActiveXTrojanHorseJavaSSIDSYNFloodAttackSpamReplayAttackWormSpywareBIOSDataWipingInternalPing ofDeathDDoSAttackAdwareDNSPoisoningVirusPhishingE-mailBombDoSAttackSpoofingJavaScriptMan-in-the MiddleattackExternalActiveXTrojanHorseJavaSSIDSYNFloodAttackSpamReplayAttackWormSpywareBIOSDataWiping

Chapter 9: Secruity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Internal
  2. Ping of Death
  3. DDoS Attack
  4. Adware
  5. DNS Poisoning
  6. Virus
  7. Phishing
  8. E-mail Bomb
  9. DoS Attack
  10. Spoofing
  11. Java Script
  12. Man-in-the Middle attack
  13. External
  14. ActiveX
  15. Trojan Horse
  16. Java
  17. SSID
  18. SYN Flood Attack
  19. Spam
  20. Replay Attack
  21. Worm
  22. Spyware
  23. BIOS
  24. Data Wiping