asymmetricencryptionSpywareEncryptiondigitalsignaturescreensaverAuthenticationnon-repudiationillicitserverKeyhashencryptionDecryptionMalwaresymmetricencryptionTyposquattingTransportLayerSecurity(TLS)Firewalldigitalcertificate"TheRight toBeForgotten"InternetControlMessagingProtocol(ICMP)Patchanit-virussoftwareTrojanHashSecureSocketsLayer(SSL)asymmetricencryptionSpywareEncryptiondigitalsignaturescreensaverAuthenticationnon-repudiationillicitserverKeyhashencryptionDecryptionMalwaresymmetricencryptionTyposquattingTransportLayerSecurity(TLS)Firewalldigitalcertificate"TheRight toBeForgotten"InternetControlMessagingProtocol(ICMP)Patchanit-virussoftwareTrojanHashSecureSocketsLayer(SSL)

IBA Lesson 8 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. asymmetric encryption
  2. Spyware
  3. Encryption
  4. digital signature
  5. screen saver
  6. Authentication
  7. non-repudiation
  8. illicit server
  9. Key
  10. hash encryption
  11. Decryption
  12. Malware
  13. symmetric encryption
  14. Typosquatting
  15. Transport Layer Security (TLS)
  16. Firewall
  17. digital certificate
  18. "The Right to Be Forgotten"
  19. Internet Control Messaging Protocol (ICMP)
  20. Patch
  21. anit-virus software
  22. Trojan
  23. Hash
  24. Secure Sockets Layer (SSL)