UCJISBasicsManual AuditMiningPassworduse(something) inthe wrong wayor for thewrong purposeSecurityAwarenessScreenLockUserIDPIISpread(something,especiallyinformation)widely. TACControlledAreaInsiderThreat ABCUtah CodeUCA 53-10-108(12)(a) Phishing hotspotEnryptucjis-tac.utah.govFingerprintsLOGS BCIMDMUserSecurityAgreementMisuseCuriosityCheckSocialEngineeringCrossCutShred ManualsFBIVirtuTesting SecurityBadgeMisdemeanorBUCJISJeffAnnuallyDisseminationThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessUCJISBasicsManual AuditMiningPassworduse(something) inthe wrong wayor for thewrong purposeSecurityAwarenessScreenLockUserIDPIISpread(something,especiallyinformation)widely. TACControlledAreaInsiderThreat ABCUtah CodeUCA 53-10-108(12)(a) Phishing hotspotEnryptucjis-tac.utah.govFingerprintsLOGS BCIMDMUserSecurityAgreementMisuseCuriosityCheckSocialEngineeringCrossCutShred ManualsFBIVirtuTesting SecurityBadgeMisdemeanorBUCJISJeffAnnuallyDisseminationThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccess

Security Awareness Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. UCJIS Basics Manual
  2. Audit
  3. Mining
  4. Password
  5. use (something) in the wrong way or for the wrong purpose
  6. Security Awareness
  7. Screen Lock
  8. User ID
  9. PII
  10. Spread (something, especially information) widely.
  11. TAC
  12. Controlled Area
  13. Insider Threat
  14. ABC
  15. Utah Code UCA 53-10- 108(12)(a)
  16. Phishing
  17. hotspot
  18. Enrypt
  19. ucjis-tac.utah.gov
  20. Fingerprints
  21. LOGS
  22. BCI
  23. MDM
  24. User Security Agreement
  25. Misuse
  26. Curiosity Check
  27. Social Engineering
  28. Cross Cut Shred
  29. Manuals
  30. FBI
  31. Virtu
  32. Testing
  33. Security Badge
  34. Misdemeanor B
  35. UCJIS
  36. Jeff
  37. Annually
  38. Dissemination
  39. The TAC serves as the point -of -contact for the local agency for matters relating to CJIS information access