FingerprintsABCTesting UCJISMDMFBIPhishing ControlledAreaMisuseSpread(something,especiallyinformation)widely. SecurityBadgeCuriosityCheckLOGS UCJISBasicsManual Utah CodeUCA 53-10-108(12)(a) The TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessJeffhotspotUserIDUserSecurityAgreementInsiderThreat MisdemeanorBSocialEngineeringManualsuse(something) inthe wrong wayor for thewrong purposeSecurityAwarenessPasswordEnryptMiningScreenLockBCIAnnuallyAuditDisseminationCrossCutShred VirtuPIITACucjis-tac.utah.govFingerprintsABCTesting UCJISMDMFBIPhishing ControlledAreaMisuseSpread(something,especiallyinformation)widely. SecurityBadgeCuriosityCheckLOGS UCJISBasicsManual Utah CodeUCA 53-10-108(12)(a) The TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessJeffhotspotUserIDUserSecurityAgreementInsiderThreat MisdemeanorBSocialEngineeringManualsuse(something) inthe wrong wayor for thewrong purposeSecurityAwarenessPasswordEnryptMiningScreenLockBCIAnnuallyAuditDisseminationCrossCutShred VirtuPIITACucjis-tac.utah.gov

Security Awareness Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Fingerprints
  2. ABC
  3. Testing
  4. UCJIS
  5. MDM
  6. FBI
  7. Phishing
  8. Controlled Area
  9. Misuse
  10. Spread (something, especially information) widely.
  11. Security Badge
  12. Curiosity Check
  13. LOGS
  14. UCJIS Basics Manual
  15. Utah Code UCA 53-10- 108(12)(a)
  16. The TAC serves as the point -of -contact for the local agency for matters relating to CJIS information access
  17. Jeff
  18. hotspot
  19. User ID
  20. User Security Agreement
  21. Insider Threat
  22. Misdemeanor B
  23. Social Engineering
  24. Manuals
  25. use (something) in the wrong way or for the wrong purpose
  26. Security Awareness
  27. Password
  28. Enrypt
  29. Mining
  30. Screen Lock
  31. BCI
  32. Annually
  33. Audit
  34. Dissemination
  35. Cross Cut Shred
  36. Virtu
  37. PII
  38. TAC
  39. ucjis-tac.utah.gov