digitalcertificatedigitalsignatureInternetControlMessagingProtocol(ICMP)TransportLayerSecurity(TLS)asymmetricencryptionscreensaverKeynon-repudiationSpywareMalwarehashencryptionHashillicitserverDecryptionAuthenticationTrojan"TheRight toBeForgotten"anit-virussoftwareEncryptionTyposquattingsymmetricencryptionPatchSecureSocketsLayer(SSL)FirewalldigitalcertificatedigitalsignatureInternetControlMessagingProtocol(ICMP)TransportLayerSecurity(TLS)asymmetricencryptionscreensaverKeynon-repudiationSpywareMalwarehashencryptionHashillicitserverDecryptionAuthenticationTrojan"TheRight toBeForgotten"anit-virussoftwareEncryptionTyposquattingsymmetricencryptionPatchSecureSocketsLayer(SSL)Firewall

IBA Lesson 8 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. digital certificate
  2. digital signature
  3. Internet Control Messaging Protocol (ICMP)
  4. Transport Layer Security (TLS)
  5. asymmetric encryption
  6. screen saver
  7. Key
  8. non-repudiation
  9. Spyware
  10. Malware
  11. hash encryption
  12. Hash
  13. illicit server
  14. Decryption
  15. Authentication
  16. Trojan
  17. "The Right to Be Forgotten"
  18. anit-virus software
  19. Encryption
  20. Typosquatting
  21. symmetric encryption
  22. Patch
  23. Secure Sockets Layer (SSL)
  24. Firewall