non-repudiationdigitalcertificateSecureSocketsLayer(SSL)InternetControlMessagingProtocol(ICMP)TyposquattingasymmetricencryptionsymmetricencryptionscreensaverKeyMalwareTransportLayerSecurity(TLS)hashencryptionFirewalldigitalsignatureillicitserverDecryption"TheRight toBeForgotten"PatchEncryptionSpywareHashAuthenticationanit-virussoftwareTrojannon-repudiationdigitalcertificateSecureSocketsLayer(SSL)InternetControlMessagingProtocol(ICMP)TyposquattingasymmetricencryptionsymmetricencryptionscreensaverKeyMalwareTransportLayerSecurity(TLS)hashencryptionFirewalldigitalsignatureillicitserverDecryption"TheRight toBeForgotten"PatchEncryptionSpywareHashAuthenticationanit-virussoftwareTrojan

IBA Lesson 8 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. non-repudiation
  2. digital certificate
  3. Secure Sockets Layer (SSL)
  4. Internet Control Messaging Protocol (ICMP)
  5. Typosquatting
  6. asymmetric encryption
  7. symmetric encryption
  8. screen saver
  9. Key
  10. Malware
  11. Transport Layer Security (TLS)
  12. hash encryption
  13. Firewall
  14. digital signature
  15. illicit server
  16. Decryption
  17. "The Right to Be Forgotten"
  18. Patch
  19. Encryption
  20. Spyware
  21. Hash
  22. Authentication
  23. anit-virus software
  24. Trojan