Spread(something,especiallyinformation)widely. MiningPhishing SocialEngineeringAuditScreenLockUCJISBasicsManual CrossCutShred ABCUserIDTesting ManualsSecurityAwarenessPIIFingerprintsTAChotspotControlledAreaUCJISUtah CodeUCA 53-10-108(12)(a) UserSecurityAgreementuse(something) inthe wrong wayor for thewrong purposeMisuseSecurityBadgeBCIInsiderThreat VirtuAnnuallyPasswordLOGS CuriosityCheckThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessDisseminationMisdemeanorBEnryptJeffFBIMDMucjis-tac.utah.govSpread(something,especiallyinformation)widely. MiningPhishing SocialEngineeringAuditScreenLockUCJISBasicsManual CrossCutShred ABCUserIDTesting ManualsSecurityAwarenessPIIFingerprintsTAChotspotControlledAreaUCJISUtah CodeUCA 53-10-108(12)(a) UserSecurityAgreementuse(something) inthe wrong wayor for thewrong purposeMisuseSecurityBadgeBCIInsiderThreat VirtuAnnuallyPasswordLOGS CuriosityCheckThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessDisseminationMisdemeanorBEnryptJeffFBIMDMucjis-tac.utah.gov

Security Awareness Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Spread (something, especially information) widely.
  2. Mining
  3. Phishing
  4. Social Engineering
  5. Audit
  6. Screen Lock
  7. UCJIS Basics Manual
  8. Cross Cut Shred
  9. ABC
  10. User ID
  11. Testing
  12. Manuals
  13. Security Awareness
  14. PII
  15. Fingerprints
  16. TAC
  17. hotspot
  18. Controlled Area
  19. UCJIS
  20. Utah Code UCA 53-10- 108(12)(a)
  21. User Security Agreement
  22. use (something) in the wrong way or for the wrong purpose
  23. Misuse
  24. Security Badge
  25. BCI
  26. Insider Threat
  27. Virtu
  28. Annually
  29. Password
  30. LOGS
  31. Curiosity Check
  32. The TAC serves as the point -of -contact for the local agency for matters relating to CJIS information access
  33. Dissemination
  34. Misdemeanor B
  35. Enrypt
  36. Jeff
  37. FBI
  38. MDM
  39. ucjis-tac.utah.gov