Interruptssignal bymatchingfrequencyand powerInterferes witha wirelesssignal usingmatchingfrequenciesShort-rangewireless techattacked byBluejackingSends faketexts to trickusers intogiving infoUses short-range pairingbetweendevicesDe-authenticationspoofing canstart thisattackVPNsprotectagainstpublic Wi-FirisksAttackusing caféWi-FiimitationEncryptionhelps protectthis kind ofcommunicationTool used tofindunauthorizeddevicesOccurs whenattackercopies infovia BluetoothDiscoversrogueaccesspoints in anetworkAnnoyingbut not trulymalicioussoftwareDeviceadded tonetworkwithoutpermissionTracks yourlocationthrough a legalbut unwantedapp featureWhenBluetooth isused to stealdata likecontactsA textphishingattackmethodUses fakeWi-Fi tocapturelogin infoSendsshockingimages viaBluetoothPolicyneeded forguest Wi-Fi accessUnauthorizedwireless pointinstalled on asecurenetworkSocialengineeringlets attackersinstall this onnetworksAddsunapprovedcapabilitieshidden in useragreementsUnauthorizedWi-Fi thatimitates areal hotspotInterruptssignal bymatchingfrequencyand powerInterferes witha wirelesssignal usingmatchingfrequenciesShort-rangewireless techattacked byBluejackingSends faketexts to trickusers intogiving infoUses short-range pairingbetweendevicesDe-authenticationspoofing canstart thisattackVPNsprotectagainstpublic Wi-FirisksAttackusing caféWi-FiimitationEncryptionhelps protectthis kind ofcommunicationTool used tofindunauthorizeddevicesOccurs whenattackercopies infovia BluetoothDiscoversrogueaccesspoints in anetworkAnnoyingbut not trulymalicioussoftwareDeviceadded tonetworkwithoutpermissionTracks yourlocationthrough a legalbut unwantedapp featureWhenBluetooth isused to stealdata likecontactsA textphishingattackmethodUses fakeWi-Fi tocapturelogin infoSendsshockingimages viaBluetoothPolicyneeded forguest Wi-Fi accessUnauthorizedwireless pointinstalled on asecurenetworkSocialengineeringlets attackersinstall this onnetworksAddsunapprovedcapabilitieshidden in useragreementsUnauthorizedWi-Fi thatimitates areal hotspot

1.4 Wireless and Mobile Device Attacks - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Interrupts signal by matching frequency and power
  2. Interferes with a wireless signal using matching frequencies
  3. Short-range wireless tech attacked by Bluejacking
  4. Sends fake texts to trick users into giving info
  5. Uses short-range pairing between devices
  6. De-authentication spoofing can start this attack
  7. VPNs protect against public Wi-Fi risks
  8. Attack using café Wi-Fi imitation
  9. Encryption helps protect this kind of communication
  10. Tool used to find unauthorized devices
  11. Occurs when attacker copies info via Bluetooth
  12. Discovers rogue access points in a network
  13. Annoying but not truly malicious software
  14. Device added to network without permission
  15. Tracks your location through a legal but unwanted app feature
  16. When Bluetooth is used to steal data like contacts
  17. A text phishing attack method
  18. Uses fake Wi-Fi to capture login info
  19. Sends shocking images via Bluetooth
  20. Policy needed for guest Wi-Fi access
  21. Unauthorized wireless point installed on a secure network
  22. Social engineering lets attackers install this on networks
  23. Adds unapproved capabilities hidden in user agreements
  24. Unauthorized Wi-Fi that imitates a real hotspot