Deviceadded tonetworkwithoutpermissionUnauthorizedwireless pointinstalled on asecurenetworkTracks yourlocationthrough a legalbut unwantedapp featureA textphishingattackmethodDe-authenticationspoofing canstart thisattackOccurs whenattackercopies infovia BluetoothPolicyneeded forguest Wi-Fi accessSends faketexts to trickusers intogiving infoSocialengineeringlets attackersinstall this onnetworksInterferes witha wirelesssignal usingmatchingfrequenciesDiscoversrogueaccesspoints in anetworkUses short-range pairingbetweendevicesInterruptssignal bymatchingfrequencyand powerAttackusing caféWi-FiimitationTool used tofindunauthorizeddevicesEncryptionhelps protectthis kind ofcommunicationWhenBluetooth isused to stealdata likecontactsVPNsprotectagainstpublic Wi-FirisksAddsunapprovedcapabilitieshidden in useragreementsSendsshockingimages viaBluetoothShort-rangewireless techattacked byBluejackingUnauthorizedWi-Fi thatimitates areal hotspotAnnoyingbut not trulymalicioussoftwareUses fakeWi-Fi tocapturelogin infoDeviceadded tonetworkwithoutpermissionUnauthorizedwireless pointinstalled on asecurenetworkTracks yourlocationthrough a legalbut unwantedapp featureA textphishingattackmethodDe-authenticationspoofing canstart thisattackOccurs whenattackercopies infovia BluetoothPolicyneeded forguest Wi-Fi accessSends faketexts to trickusers intogiving infoSocialengineeringlets attackersinstall this onnetworksInterferes witha wirelesssignal usingmatchingfrequenciesDiscoversrogueaccesspoints in anetworkUses short-range pairingbetweendevicesInterruptssignal bymatchingfrequencyand powerAttackusing caféWi-FiimitationTool used tofindunauthorizeddevicesEncryptionhelps protectthis kind ofcommunicationWhenBluetooth isused to stealdata likecontactsVPNsprotectagainstpublic Wi-FirisksAddsunapprovedcapabilitieshidden in useragreementsSendsshockingimages viaBluetoothShort-rangewireless techattacked byBluejackingUnauthorizedWi-Fi thatimitates areal hotspotAnnoyingbut not trulymalicioussoftwareUses fakeWi-Fi tocapturelogin info

1.4 Wireless and Mobile Device Attacks - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Device added to network without permission
  2. Unauthorized wireless point installed on a secure network
  3. Tracks your location through a legal but unwanted app feature
  4. A text phishing attack method
  5. De-authentication spoofing can start this attack
  6. Occurs when attacker copies info via Bluetooth
  7. Policy needed for guest Wi-Fi access
  8. Sends fake texts to trick users into giving info
  9. Social engineering lets attackers install this on networks
  10. Interferes with a wireless signal using matching frequencies
  11. Discovers rogue access points in a network
  12. Uses short-range pairing between devices
  13. Interrupts signal by matching frequency and power
  14. Attack using café Wi-Fi imitation
  15. Tool used to find unauthorized devices
  16. Encryption helps protect this kind of communication
  17. When Bluetooth is used to steal data like contacts
  18. VPNs protect against public Wi-Fi risks
  19. Adds unapproved capabilities hidden in user agreements
  20. Sends shocking images via Bluetooth
  21. Short-range wireless tech attacked by Bluejacking
  22. Unauthorized Wi-Fi that imitates a real hotspot
  23. Annoying but not truly malicious software
  24. Uses fake Wi-Fi to capture login info