digital certificate digital signature Internet Control Messaging Protocol (ICMP) Transport Layer Security (TLS) asymmetric encryption screen saver Key non- repudiation Spyware Malware hash encryption Hash illicit server Decryption Authentication Trojan "The Right to Be Forgotten" anit- virus software Encryption Typosquatting symmetric encryption Patch Secure Sockets Layer (SSL) Firewall digital certificate digital signature Internet Control Messaging Protocol (ICMP) Transport Layer Security (TLS) asymmetric encryption screen saver Key non- repudiation Spyware Malware hash encryption Hash illicit server Decryption Authentication Trojan "The Right to Be Forgotten" anit- virus software Encryption Typosquatting symmetric encryption Patch Secure Sockets Layer (SSL) Firewall
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
digital certificate
digital signature
Internet Control Messaging Protocol (ICMP)
Transport
Layer Security (TLS)
asymmetric encryption
screen saver
Key
non-repudiation
Spyware
Malware
hash encryption
Hash
illicit server
Decryption
Authentication
Trojan
"The Right to Be Forgotten"
anit-virus software
Encryption
Typosquatting
symmetric encryption
Patch
Secure Sockets Layer (SSL)
Firewall