UCJISFingerprintsMiningControlledAreaManualsJeffMisdemeanorBuse(something) inthe wrong wayor for thewrong purposeMisuseVirtuBCISecurityBadgeTACSpread(something,especiallyinformation)widely. SecurityAwarenessSocialEngineeringUtah CodeUCA 53-10-108(12)(a) AuditLOGS PasswordTesting ScreenLockCuriosityCheckPhishing FBIEnryptCrossCutShred MDMUCJISBasicsManual The TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessPIIUserSecurityAgreementhotspotUserIDInsiderThreat ucjis-tac.utah.govABCDisseminationAnnuallyUCJISFingerprintsMiningControlledAreaManualsJeffMisdemeanorBuse(something) inthe wrong wayor for thewrong purposeMisuseVirtuBCISecurityBadgeTACSpread(something,especiallyinformation)widely. SecurityAwarenessSocialEngineeringUtah CodeUCA 53-10-108(12)(a) AuditLOGS PasswordTesting ScreenLockCuriosityCheckPhishing FBIEnryptCrossCutShred MDMUCJISBasicsManual The TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessPIIUserSecurityAgreementhotspotUserIDInsiderThreat ucjis-tac.utah.govABCDisseminationAnnually

Security Awareness Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. UCJIS
  2. Fingerprints
  3. Mining
  4. Controlled Area
  5. Manuals
  6. Jeff
  7. Misdemeanor B
  8. use (something) in the wrong way or for the wrong purpose
  9. Misuse
  10. Virtu
  11. BCI
  12. Security Badge
  13. TAC
  14. Spread (something, especially information) widely.
  15. Security Awareness
  16. Social Engineering
  17. Utah Code UCA 53-10- 108(12)(a)
  18. Audit
  19. LOGS
  20. Password
  21. Testing
  22. Screen Lock
  23. Curiosity Check
  24. Phishing
  25. FBI
  26. Enrypt
  27. Cross Cut Shred
  28. MDM
  29. UCJIS Basics Manual
  30. The TAC serves as the point -of -contact for the local agency for matters relating to CJIS information access
  31. PII
  32. User Security Agreement
  33. hotspot
  34. User ID
  35. Insider Threat
  36. ucjis-tac.utah.gov
  37. ABC
  38. Dissemination
  39. Annually