CrossCutShred BCIVirtuCuriosityCheckAuditSocialEngineeringABCTACUCJISBasicsManual Jeffucjis-tac.utah.govSpread(something,especiallyinformation)widely. UCJISPhishing Utah CodeUCA 53-10-108(12)(a) PasswordInsiderThreat DisseminationMisuseFBISecurityAwarenessPIIUserSecurityAgreementMisdemeanorBControlledAreaMDMhotspotThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessAnnuallyScreenLockUserIDFingerprintsEnryptSecurityBadgeuse(something) inthe wrong wayor for thewrong purposeTesting MiningManualsLOGS CrossCutShred BCIVirtuCuriosityCheckAuditSocialEngineeringABCTACUCJISBasicsManual Jeffucjis-tac.utah.govSpread(something,especiallyinformation)widely. UCJISPhishing Utah CodeUCA 53-10-108(12)(a) PasswordInsiderThreat DisseminationMisuseFBISecurityAwarenessPIIUserSecurityAgreementMisdemeanorBControlledAreaMDMhotspotThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessAnnuallyScreenLockUserIDFingerprintsEnryptSecurityBadgeuse(something) inthe wrong wayor for thewrong purposeTesting MiningManualsLOGS 

Security Awareness Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Cross Cut Shred
  2. BCI
  3. Virtu
  4. Curiosity Check
  5. Audit
  6. Social Engineering
  7. ABC
  8. TAC
  9. UCJIS Basics Manual
  10. Jeff
  11. ucjis-tac.utah.gov
  12. Spread (something, especially information) widely.
  13. UCJIS
  14. Phishing
  15. Utah Code UCA 53-10- 108(12)(a)
  16. Password
  17. Insider Threat
  18. Dissemination
  19. Misuse
  20. FBI
  21. Security Awareness
  22. PII
  23. User Security Agreement
  24. Misdemeanor B
  25. Controlled Area
  26. MDM
  27. hotspot
  28. The TAC serves as the point -of -contact for the local agency for matters relating to CJIS information access
  29. Annually
  30. Screen Lock
  31. User ID
  32. Fingerprints
  33. Enrypt
  34. Security Badge
  35. use (something) in the wrong way or for the wrong purpose
  36. Testing
  37. Mining
  38. Manuals
  39. LOGS