anit- virus software Patch Malware Encryption hash encryption Transport Layer Security (TLS) Typosquatting Decryption Firewall illicit server non- repudiation Trojan Spyware asymmetric encryption Internet Control Messaging Protocol (ICMP) Authentication Key Hash symmetric encryption screen saver Secure Sockets Layer (SSL) digital certificate "The Right to Be Forgotten" digital signature anit- virus software Patch Malware Encryption hash encryption Transport Layer Security (TLS) Typosquatting Decryption Firewall illicit server non- repudiation Trojan Spyware asymmetric encryption Internet Control Messaging Protocol (ICMP) Authentication Key Hash symmetric encryption screen saver Secure Sockets Layer (SSL) digital certificate "The Right to Be Forgotten" digital signature
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
anit-virus software
Patch
Malware
Encryption
hash encryption
Transport
Layer Security (TLS)
Typosquatting
Decryption
Firewall
illicit server
non-repudiation
Trojan
Spyware
asymmetric encryption
Internet Control Messaging Protocol (ICMP)
Authentication
Key
Hash
symmetric encryption
screen saver
Secure Sockets Layer (SSL)
digital certificate
"The Right to Be Forgotten"
digital signature