Interruptssignal bymatchingfrequencyand powerOccurs whenattackercopies infovia BluetoothAnnoyingbut not trulymalicioussoftwareDe-authenticationspoofing canstart thisattackUnauthorizedWi-Fi thatimitates areal hotspotTracks yourlocationthrough a legalbut unwantedapp featureAddsunapprovedcapabilitieshidden in useragreementsSocialengineeringlets attackersinstall this onnetworksVPNsprotectagainstpublic Wi-FirisksTool used tofindunauthorizeddevicesDeviceadded tonetworkwithoutpermissionAttackusing caféWi-FiimitationUses fakeWi-Fi tocapturelogin infoEncryptionhelps protectthis kind ofcommunicationUses short-range pairingbetweendevicesA textphishingattackmethodInterferes witha wirelesssignal usingmatchingfrequenciesSendsshockingimages viaBluetoothShort-rangewireless techattacked byBluejackingDiscoversrogueaccesspoints in anetworkPolicyneeded forguest Wi-Fi accessSends faketexts to trickusers intogiving infoWhenBluetooth isused to stealdata likecontactsUnauthorizedwireless pointinstalled on asecurenetworkInterruptssignal bymatchingfrequencyand powerOccurs whenattackercopies infovia BluetoothAnnoyingbut not trulymalicioussoftwareDe-authenticationspoofing canstart thisattackUnauthorizedWi-Fi thatimitates areal hotspotTracks yourlocationthrough a legalbut unwantedapp featureAddsunapprovedcapabilitieshidden in useragreementsSocialengineeringlets attackersinstall this onnetworksVPNsprotectagainstpublic Wi-FirisksTool used tofindunauthorizeddevicesDeviceadded tonetworkwithoutpermissionAttackusing caféWi-FiimitationUses fakeWi-Fi tocapturelogin infoEncryptionhelps protectthis kind ofcommunicationUses short-range pairingbetweendevicesA textphishingattackmethodInterferes witha wirelesssignal usingmatchingfrequenciesSendsshockingimages viaBluetoothShort-rangewireless techattacked byBluejackingDiscoversrogueaccesspoints in anetworkPolicyneeded forguest Wi-Fi accessSends faketexts to trickusers intogiving infoWhenBluetooth isused to stealdata likecontactsUnauthorizedwireless pointinstalled on asecurenetwork

1.4 Wireless and Mobile Device Attacks - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Interrupts signal by matching frequency and power
  2. Occurs when attacker copies info via Bluetooth
  3. Annoying but not truly malicious software
  4. De-authentication spoofing can start this attack
  5. Unauthorized Wi-Fi that imitates a real hotspot
  6. Tracks your location through a legal but unwanted app feature
  7. Adds unapproved capabilities hidden in user agreements
  8. Social engineering lets attackers install this on networks
  9. VPNs protect against public Wi-Fi risks
  10. Tool used to find unauthorized devices
  11. Device added to network without permission
  12. Attack using café Wi-Fi imitation
  13. Uses fake Wi-Fi to capture login info
  14. Encryption helps protect this kind of communication
  15. Uses short-range pairing between devices
  16. A text phishing attack method
  17. Interferes with a wireless signal using matching frequencies
  18. Sends shocking images via Bluetooth
  19. Short-range wireless tech attacked by Bluejacking
  20. Discovers rogue access points in a network
  21. Policy needed for guest Wi-Fi access
  22. Sends fake texts to trick users into giving info
  23. When Bluetooth is used to steal data like contacts
  24. Unauthorized wireless point installed on a secure network