UserSecurityAgreementUCJISVirtuSecurityBadgeSpread(something,especiallyinformation)widely. FingerprintsUtah CodeUCA 53-10-108(12)(a) ScreenLockPassworduse(something) inthe wrong wayor for thewrong purposeMisuseCuriosityCheckFBIEnryptDisseminationJeffCrossCutShred BCIManualsMisdemeanorBUCJISBasicsManual ABCInsiderThreat ucjis-tac.utah.govMiningSecurityAwarenessTesting AnnuallyControlledAreaMDMPhishing UserIDLOGS SocialEngineeringhotspotAuditTACPIIThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessUserSecurityAgreementUCJISVirtuSecurityBadgeSpread(something,especiallyinformation)widely. FingerprintsUtah CodeUCA 53-10-108(12)(a) ScreenLockPassworduse(something) inthe wrong wayor for thewrong purposeMisuseCuriosityCheckFBIEnryptDisseminationJeffCrossCutShred BCIManualsMisdemeanorBUCJISBasicsManual ABCInsiderThreat ucjis-tac.utah.govMiningSecurityAwarenessTesting AnnuallyControlledAreaMDMPhishing UserIDLOGS SocialEngineeringhotspotAuditTACPIIThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccess

Security Awareness Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. User Security Agreement
  2. UCJIS
  3. Virtu
  4. Security Badge
  5. Spread (something, especially information) widely.
  6. Fingerprints
  7. Utah Code UCA 53-10- 108(12)(a)
  8. Screen Lock
  9. Password
  10. use (something) in the wrong way or for the wrong purpose
  11. Misuse
  12. Curiosity Check
  13. FBI
  14. Enrypt
  15. Dissemination
  16. Jeff
  17. Cross Cut Shred
  18. BCI
  19. Manuals
  20. Misdemeanor B
  21. UCJIS Basics Manual
  22. ABC
  23. Insider Threat
  24. ucjis-tac.utah.gov
  25. Mining
  26. Security Awareness
  27. Testing
  28. Annually
  29. Controlled Area
  30. MDM
  31. Phishing
  32. User ID
  33. LOGS
  34. Social Engineering
  35. hotspot
  36. Audit
  37. TAC
  38. PII
  39. The TAC serves as the point -of -contact for the local agency for matters relating to CJIS information access