UCJISJeffPIISecurityAwarenessScreenLockUserIDuse(something) inthe wrong wayor for thewrong purposeUserSecurityAgreementMisuseTACEnryptBCIMDMSecurityBadgeUCJISBasicsManual The TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccesshotspotUtah CodeUCA 53-10-108(12)(a) InsiderThreat MiningCrossCutShred Testing Spread(something,especiallyinformation)widely. ABCFBIPasswordMisdemeanorBManualsFingerprintsAuditLOGS SocialEngineeringDisseminationVirtuPhishing CuriosityCheckucjis-tac.utah.govAnnuallyControlledAreaUCJISJeffPIISecurityAwarenessScreenLockUserIDuse(something) inthe wrong wayor for thewrong purposeUserSecurityAgreementMisuseTACEnryptBCIMDMSecurityBadgeUCJISBasicsManual The TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccesshotspotUtah CodeUCA 53-10-108(12)(a) InsiderThreat MiningCrossCutShred Testing Spread(something,especiallyinformation)widely. ABCFBIPasswordMisdemeanorBManualsFingerprintsAuditLOGS SocialEngineeringDisseminationVirtuPhishing CuriosityCheckucjis-tac.utah.govAnnuallyControlledArea

Security Awareness Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. UCJIS
  2. Jeff
  3. PII
  4. Security Awareness
  5. Screen Lock
  6. User ID
  7. use (something) in the wrong way or for the wrong purpose
  8. User Security Agreement
  9. Misuse
  10. TAC
  11. Enrypt
  12. BCI
  13. MDM
  14. Security Badge
  15. UCJIS Basics Manual
  16. The TAC serves as the point -of -contact for the local agency for matters relating to CJIS information access
  17. hotspot
  18. Utah Code UCA 53-10- 108(12)(a)
  19. Insider Threat
  20. Mining
  21. Cross Cut Shred
  22. Testing
  23. Spread (something, especially information) widely.
  24. ABC
  25. FBI
  26. Password
  27. Misdemeanor B
  28. Manuals
  29. Fingerprints
  30. Audit
  31. LOGS
  32. Social Engineering
  33. Dissemination
  34. Virtu
  35. Phishing
  36. Curiosity Check
  37. ucjis-tac.utah.gov
  38. Annually
  39. Controlled Area