InsiderThreat MDMEnryptDisseminationABCAuditTesting CrossCutShred VirtuUCJISScreenLockCuriosityCheckPhishing TACFingerprintsUtah CodeUCA 53-10-108(12)(a) MisuseControlledAreaSocialEngineeringAnnuallySecurityBadgeMisdemeanorBSecurityAwarenessManualsBCILOGS UCJISBasicsManual ucjis-tac.utah.govSpread(something,especiallyinformation)widely. MiningUserSecurityAgreementThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessJeffhotspotPasswordFBIUserIDPIIuse(something) inthe wrong wayor for thewrong purposeInsiderThreat MDMEnryptDisseminationABCAuditTesting CrossCutShred VirtuUCJISScreenLockCuriosityCheckPhishing TACFingerprintsUtah CodeUCA 53-10-108(12)(a) MisuseControlledAreaSocialEngineeringAnnuallySecurityBadgeMisdemeanorBSecurityAwarenessManualsBCILOGS UCJISBasicsManual ucjis-tac.utah.govSpread(something,especiallyinformation)widely. MiningUserSecurityAgreementThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessJeffhotspotPasswordFBIUserIDPIIuse(something) inthe wrong wayor for thewrong purpose

Security Awareness Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Insider Threat
  2. MDM
  3. Enrypt
  4. Dissemination
  5. ABC
  6. Audit
  7. Testing
  8. Cross Cut Shred
  9. Virtu
  10. UCJIS
  11. Screen Lock
  12. Curiosity Check
  13. Phishing
  14. TAC
  15. Fingerprints
  16. Utah Code UCA 53-10- 108(12)(a)
  17. Misuse
  18. Controlled Area
  19. Social Engineering
  20. Annually
  21. Security Badge
  22. Misdemeanor B
  23. Security Awareness
  24. Manuals
  25. BCI
  26. LOGS
  27. UCJIS Basics Manual
  28. ucjis-tac.utah.gov
  29. Spread (something, especially information) widely.
  30. Mining
  31. User Security Agreement
  32. The TAC serves as the point -of -contact for the local agency for matters relating to CJIS information access
  33. Jeff
  34. hotspot
  35. Password
  36. FBI
  37. User ID
  38. PII
  39. use (something) in the wrong way or for the wrong purpose