Decryption Spyware Firewall asymmetric encryption Typosquatting non- repudiation symmetric encryption Malware Transport Layer Security (TLS) screen saver anit- virus software digital certificate illicit server "The Right to Be Forgotten" Key Encryption Hash hash encryption Internet Control Messaging Protocol (ICMP) Secure Sockets Layer (SSL) Authentication Patch digital signature Trojan Decryption Spyware Firewall asymmetric encryption Typosquatting non- repudiation symmetric encryption Malware Transport Layer Security (TLS) screen saver anit- virus software digital certificate illicit server "The Right to Be Forgotten" Key Encryption Hash hash encryption Internet Control Messaging Protocol (ICMP) Secure Sockets Layer (SSL) Authentication Patch digital signature Trojan
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Decryption
Spyware
Firewall
asymmetric encryption
Typosquatting
non-repudiation
symmetric encryption
Malware
Transport
Layer Security (TLS)
screen saver
anit-virus software
digital certificate
illicit server
"The Right to Be Forgotten"
Key
Encryption
Hash
hash encryption
Internet Control Messaging Protocol (ICMP)
Secure Sockets Layer (SSL)
Authentication
Patch
digital signature
Trojan