Decryption Authentication screen saver Malware Key Trojan anit- virus software hash encryption Internet Control Messaging Protocol (ICMP) Firewall non- repudiation digital certificate illicit server Transport Layer Security (TLS) symmetric encryption Typosquatting Secure Sockets Layer (SSL) "The Right to Be Forgotten" Spyware Patch digital signature Encryption Hash asymmetric encryption Decryption Authentication screen saver Malware Key Trojan anit- virus software hash encryption Internet Control Messaging Protocol (ICMP) Firewall non- repudiation digital certificate illicit server Transport Layer Security (TLS) symmetric encryption Typosquatting Secure Sockets Layer (SSL) "The Right to Be Forgotten" Spyware Patch digital signature Encryption Hash asymmetric encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Decryption
Authentication
screen saver
Malware
Key
Trojan
anit-virus software
hash encryption
Internet Control Messaging Protocol (ICMP)
Firewall
non-repudiation
digital certificate
illicit server
Transport
Layer Security (TLS)
symmetric encryption
Typosquatting
Secure Sockets Layer (SSL)
"The Right to Be Forgotten"
Spyware
Patch
digital signature
Encryption
Hash
asymmetric encryption