Attackusing caféWi-FiimitationWhenBluetooth isused to stealdata likecontactsDiscoversrogueaccesspoints in anetworkA textphishingattackmethodDeviceadded tonetworkwithoutpermissionTool used tofindunauthorizeddevicesInterferes witha wirelesssignal usingmatchingfrequenciesPolicyneeded forguest Wi-Fi accessTracks yourlocationthrough a legalbut unwantedapp featureUses short-range pairingbetweendevicesSocialengineeringlets attackersinstall this onnetworksInterruptssignal bymatchingfrequencyand powerEncryptionhelps protectthis kind ofcommunicationOccurs whenattackercopies infovia BluetoothUnauthorizedWi-Fi thatimitates areal hotspotAddsunapprovedcapabilitieshidden in useragreementsAnnoyingbut not trulymalicioussoftwareUnauthorizedwireless pointinstalled on asecurenetworkVPNsprotectagainstpublic Wi-FirisksUses fakeWi-Fi tocapturelogin infoDe-authenticationspoofing canstart thisattackShort-rangewireless techattacked byBluejackingSends faketexts to trickusers intogiving infoSendsshockingimages viaBluetoothAttackusing caféWi-FiimitationWhenBluetooth isused to stealdata likecontactsDiscoversrogueaccesspoints in anetworkA textphishingattackmethodDeviceadded tonetworkwithoutpermissionTool used tofindunauthorizeddevicesInterferes witha wirelesssignal usingmatchingfrequenciesPolicyneeded forguest Wi-Fi accessTracks yourlocationthrough a legalbut unwantedapp featureUses short-range pairingbetweendevicesSocialengineeringlets attackersinstall this onnetworksInterruptssignal bymatchingfrequencyand powerEncryptionhelps protectthis kind ofcommunicationOccurs whenattackercopies infovia BluetoothUnauthorizedWi-Fi thatimitates areal hotspotAddsunapprovedcapabilitieshidden in useragreementsAnnoyingbut not trulymalicioussoftwareUnauthorizedwireless pointinstalled on asecurenetworkVPNsprotectagainstpublic Wi-FirisksUses fakeWi-Fi tocapturelogin infoDe-authenticationspoofing canstart thisattackShort-rangewireless techattacked byBluejackingSends faketexts to trickusers intogiving infoSendsshockingimages viaBluetooth

1.4 Wireless and Mobile Device Attacks - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Attack using café Wi-Fi imitation
  2. When Bluetooth is used to steal data like contacts
  3. Discovers rogue access points in a network
  4. A text phishing attack method
  5. Device added to network without permission
  6. Tool used to find unauthorized devices
  7. Interferes with a wireless signal using matching frequencies
  8. Policy needed for guest Wi-Fi access
  9. Tracks your location through a legal but unwanted app feature
  10. Uses short-range pairing between devices
  11. Social engineering lets attackers install this on networks
  12. Interrupts signal by matching frequency and power
  13. Encryption helps protect this kind of communication
  14. Occurs when attacker copies info via Bluetooth
  15. Unauthorized Wi-Fi that imitates a real hotspot
  16. Adds unapproved capabilities hidden in user agreements
  17. Annoying but not truly malicious software
  18. Unauthorized wireless point installed on a secure network
  19. VPNs protect against public Wi-Fi risks
  20. Uses fake Wi-Fi to capture login info
  21. De-authentication spoofing can start this attack
  22. Short-range wireless tech attacked by Bluejacking
  23. Sends fake texts to trick users into giving info
  24. Sends shocking images via Bluetooth