Attackusing caféWi-FiimitationDe-authenticationspoofing canstart thisattackTracks yourlocationthrough a legalbut unwantedapp featureSocialengineeringlets attackersinstall this onnetworksInterruptssignal bymatchingfrequencyand powerInterferes witha wirelesssignal usingmatchingfrequenciesSends faketexts to trickusers intogiving infoEncryptionhelps protectthis kind ofcommunicationDiscoversrogueaccesspoints in anetworkWhenBluetooth isused to stealdata likecontactsShort-rangewireless techattacked byBluejackingAddsunapprovedcapabilitieshidden in useragreementsPolicyneeded forguest Wi-Fi accessUses short-range pairingbetweendevicesAnnoyingbut not trulymalicioussoftwareUnauthorizedwireless pointinstalled on asecurenetworkA textphishingattackmethodUnauthorizedWi-Fi thatimitates areal hotspotVPNsprotectagainstpublic Wi-FirisksUses fakeWi-Fi tocapturelogin infoOccurs whenattackercopies infovia BluetoothSendsshockingimages viaBluetoothTool used tofindunauthorizeddevicesDeviceadded tonetworkwithoutpermissionAttackusing caféWi-FiimitationDe-authenticationspoofing canstart thisattackTracks yourlocationthrough a legalbut unwantedapp featureSocialengineeringlets attackersinstall this onnetworksInterruptssignal bymatchingfrequencyand powerInterferes witha wirelesssignal usingmatchingfrequenciesSends faketexts to trickusers intogiving infoEncryptionhelps protectthis kind ofcommunicationDiscoversrogueaccesspoints in anetworkWhenBluetooth isused to stealdata likecontactsShort-rangewireless techattacked byBluejackingAddsunapprovedcapabilitieshidden in useragreementsPolicyneeded forguest Wi-Fi accessUses short-range pairingbetweendevicesAnnoyingbut not trulymalicioussoftwareUnauthorizedwireless pointinstalled on asecurenetworkA textphishingattackmethodUnauthorizedWi-Fi thatimitates areal hotspotVPNsprotectagainstpublic Wi-FirisksUses fakeWi-Fi tocapturelogin infoOccurs whenattackercopies infovia BluetoothSendsshockingimages viaBluetoothTool used tofindunauthorizeddevicesDeviceadded tonetworkwithoutpermission

1.4 Wireless and Mobile Device Attacks - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Attack using café Wi-Fi imitation
  2. De-authentication spoofing can start this attack
  3. Tracks your location through a legal but unwanted app feature
  4. Social engineering lets attackers install this on networks
  5. Interrupts signal by matching frequency and power
  6. Interferes with a wireless signal using matching frequencies
  7. Sends fake texts to trick users into giving info
  8. Encryption helps protect this kind of communication
  9. Discovers rogue access points in a network
  10. When Bluetooth is used to steal data like contacts
  11. Short-range wireless tech attacked by Bluejacking
  12. Adds unapproved capabilities hidden in user agreements
  13. Policy needed for guest Wi-Fi access
  14. Uses short-range pairing between devices
  15. Annoying but not truly malicious software
  16. Unauthorized wireless point installed on a secure network
  17. A text phishing attack method
  18. Unauthorized Wi-Fi that imitates a real hotspot
  19. VPNs protect against public Wi-Fi risks
  20. Uses fake Wi-Fi to capture login info
  21. Occurs when attacker copies info via Bluetooth
  22. Sends shocking images via Bluetooth
  23. Tool used to find unauthorized devices
  24. Device added to network without permission