non- repudiation digital certificate Secure Sockets Layer (SSL) Internet Control Messaging Protocol (ICMP) Typosquatting asymmetric encryption symmetric encryption screen saver Key Malware Transport Layer Security (TLS) hash encryption Firewall digital signature illicit server Decryption "The Right to Be Forgotten" Patch Encryption Spyware Hash Authentication anit- virus software Trojan non- repudiation digital certificate Secure Sockets Layer (SSL) Internet Control Messaging Protocol (ICMP) Typosquatting asymmetric encryption symmetric encryption screen saver Key Malware Transport Layer Security (TLS) hash encryption Firewall digital signature illicit server Decryption "The Right to Be Forgotten" Patch Encryption Spyware Hash Authentication anit- virus software Trojan
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
non-repudiation
digital certificate
Secure Sockets Layer (SSL)
Internet Control Messaging Protocol (ICMP)
Typosquatting
asymmetric encryption
symmetric encryption
screen saver
Key
Malware
Transport
Layer Security (TLS)
hash encryption
Firewall
digital signature
illicit server
Decryption
"The Right to Be Forgotten"
Patch
Encryption
Spyware
Hash
Authentication
anit-virus software
Trojan