Uses short-range pairingbetweendevicesSocialengineeringlets attackersinstall this onnetworksInterferes witha wirelesssignal usingmatchingfrequenciesA textphishingattackmethodTool used tofindunauthorizeddevicesTracks yourlocationthrough a legalbut unwantedapp featureEncryptionhelps protectthis kind ofcommunicationUnauthorizedwireless pointinstalled on asecurenetworkVPNsprotectagainstpublic Wi-FirisksInterruptssignal bymatchingfrequencyand powerPolicyneeded forguest Wi-Fi accessSendsshockingimages viaBluetoothAnnoyingbut not trulymalicioussoftwareShort-rangewireless techattacked byBluejackingAddsunapprovedcapabilitieshidden in useragreementsDiscoversrogueaccesspoints in anetworkDe-authenticationspoofing canstart thisattackOccurs whenattackercopies infovia BluetoothAttackusing caféWi-FiimitationUses fakeWi-Fi tocapturelogin infoWhenBluetooth isused to stealdata likecontactsUnauthorizedWi-Fi thatimitates areal hotspotDeviceadded tonetworkwithoutpermissionSends faketexts to trickusers intogiving infoUses short-range pairingbetweendevicesSocialengineeringlets attackersinstall this onnetworksInterferes witha wirelesssignal usingmatchingfrequenciesA textphishingattackmethodTool used tofindunauthorizeddevicesTracks yourlocationthrough a legalbut unwantedapp featureEncryptionhelps protectthis kind ofcommunicationUnauthorizedwireless pointinstalled on asecurenetworkVPNsprotectagainstpublic Wi-FirisksInterruptssignal bymatchingfrequencyand powerPolicyneeded forguest Wi-Fi accessSendsshockingimages viaBluetoothAnnoyingbut not trulymalicioussoftwareShort-rangewireless techattacked byBluejackingAddsunapprovedcapabilitieshidden in useragreementsDiscoversrogueaccesspoints in anetworkDe-authenticationspoofing canstart thisattackOccurs whenattackercopies infovia BluetoothAttackusing caféWi-FiimitationUses fakeWi-Fi tocapturelogin infoWhenBluetooth isused to stealdata likecontactsUnauthorizedWi-Fi thatimitates areal hotspotDeviceadded tonetworkwithoutpermissionSends faketexts to trickusers intogiving info

1.4 Wireless and Mobile Device Attacks - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Uses short-range pairing between devices
  2. Social engineering lets attackers install this on networks
  3. Interferes with a wireless signal using matching frequencies
  4. A text phishing attack method
  5. Tool used to find unauthorized devices
  6. Tracks your location through a legal but unwanted app feature
  7. Encryption helps protect this kind of communication
  8. Unauthorized wireless point installed on a secure network
  9. VPNs protect against public Wi-Fi risks
  10. Interrupts signal by matching frequency and power
  11. Policy needed for guest Wi-Fi access
  12. Sends shocking images via Bluetooth
  13. Annoying but not truly malicious software
  14. Short-range wireless tech attacked by Bluejacking
  15. Adds unapproved capabilities hidden in user agreements
  16. Discovers rogue access points in a network
  17. De-authentication spoofing can start this attack
  18. Occurs when attacker copies info via Bluetooth
  19. Attack using café Wi-Fi imitation
  20. Uses fake Wi-Fi to capture login info
  21. When Bluetooth is used to steal data like contacts
  22. Unauthorized Wi-Fi that imitates a real hotspot
  23. Device added to network without permission
  24. Sends fake texts to trick users into giving info