(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
Incident Response
White Hat Hacker
This conceals data in another files such as graphics, audio or video file
Steganography
encrypting the contents of a system and demanding payment to recover
Ransomware
pseudorandom value ensures that plaintext input does not produce the same ciphertext output, even when the same encryption key is used.
IV
Tokenization
Asymmetric algo that factors very large integers; 2048 min key size
RSA
Tim Berners-Lee
INVENTOR OF WWW
VPN (Virtual Private Network)
Patch
Malware
reversible process that converts data into an unreadable format, and then back to its original form.
Encryption
Black Hat Hacker
Antivirus
Access Control
cover multiple domains or URLs
SAN
used by app developers; run at your own risk
code signing certs
Rootkit
deprecated block cipher algo replaced by AES
IDEA
BOB KAHN
INVENTOR OF TCP
legacy block cipher symmetric algo
DES
a symmetric algo widely used
AES
DoD
inventor of the Internet
compares two inputs and produces a single binary output
XOR
issues all certificates to end users
CA
Cryptography
advantage of symmetric algos
fast
Phishing
revoked S/N that have been invalidated
CRL
considered layers 4-7
Firewall
TFTP
port 69
a symmetric algorithm used for email and SMS
PGP
preservation or integrity
fixity
used for PK encryption with DH and PGP
Elgamal
Intrusion Detection System (IDS)
DES
A symmetric algorithm
one way mathematical function easy to compute but irreversible
Hashing
completely prevents visibility of the data
Nulling
Web security that’s now antiquated
SSL
Subordinates who validate issuing CAs
intermediate CA
Biometric Authentication
Asymmetric Algo generally used to generate a shared key over a public network
DH
Social Engineering
port number for DNS
53
NIST (National Institute of Standards and Technology)
highest block size for AES
256
port used for emails
143
combining blocks and an IV using an XOR operation
CBC