Patchanit-virussoftwaresymmetricencryptionDecryptionSecureSocketsLayer(SSL)asymmetricencryptionTyposquattingSpywaredigitalcertificatenon-repudiationAuthentication"TheRight toBeForgotten"HashhashencryptionFirewallEncryptionInternetControlMessagingProtocol(ICMP)TrojanTransportLayerSecurity(TLS)MalwaredigitalsignaturescreensaverillicitserverKeyPatchanit-virussoftwaresymmetricencryptionDecryptionSecureSocketsLayer(SSL)asymmetricencryptionTyposquattingSpywaredigitalcertificatenon-repudiationAuthentication"TheRight toBeForgotten"HashhashencryptionFirewallEncryptionInternetControlMessagingProtocol(ICMP)TrojanTransportLayerSecurity(TLS)MalwaredigitalsignaturescreensaverillicitserverKey

IBA Lesson 8 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Patch
  2. anit-virus software
  3. symmetric encryption
  4. Decryption
  5. Secure Sockets Layer (SSL)
  6. asymmetric encryption
  7. Typosquatting
  8. Spyware
  9. digital certificate
  10. non-repudiation
  11. Authentication
  12. "The Right to Be Forgotten"
  13. Hash
  14. hash encryption
  15. Firewall
  16. Encryption
  17. Internet Control Messaging Protocol (ICMP)
  18. Trojan
  19. Transport Layer Security (TLS)
  20. Malware
  21. digital signature
  22. screen saver
  23. illicit server
  24. Key