"TheRight toBeForgotten"DecryptionInternetControlMessagingProtocol(ICMP)non-repudiationillicitserverhashencryptionsymmetricencryptionanit-virussoftwareasymmetricencryptionEncryptionAuthenticationPatchTransportLayerSecurity(TLS)digitalcertificateFirewallKeydigitalsignatureHashTrojanTyposquattingscreensaverSpywareMalwareSecureSocketsLayer(SSL)"TheRight toBeForgotten"DecryptionInternetControlMessagingProtocol(ICMP)non-repudiationillicitserverhashencryptionsymmetricencryptionanit-virussoftwareasymmetricencryptionEncryptionAuthenticationPatchTransportLayerSecurity(TLS)digitalcertificateFirewallKeydigitalsignatureHashTrojanTyposquattingscreensaverSpywareMalwareSecureSocketsLayer(SSL)

IBA Lesson 8 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. "The Right to Be Forgotten"
  2. Decryption
  3. Internet Control Messaging Protocol (ICMP)
  4. non-repudiation
  5. illicit server
  6. hash encryption
  7. symmetric encryption
  8. anit-virus software
  9. asymmetric encryption
  10. Encryption
  11. Authentication
  12. Patch
  13. Transport Layer Security (TLS)
  14. digital certificate
  15. Firewall
  16. Key
  17. digital signature
  18. Hash
  19. Trojan
  20. Typosquatting
  21. screen saver
  22. Spyware
  23. Malware
  24. Secure Sockets Layer (SSL)