(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
Tim Berners-Lee
INVENTOR OF WWW
Asymmetric algo that factors very large integers; 2048 min key size
RSA
DES
A symmetric algorithm
Subordinates who validate issuing CAs
intermediate CA
Access Control
reversible process that converts data into an unreadable format, and then back to its original form.
Encryption
BOB KAHN
INVENTOR OF TCP
encrypting the contents of a system and demanding payment to recover
Ransomware
NIST (National Institute of Standards and Technology)
legacy block cipher symmetric algo
DES
advantage of symmetric algos
fast
preservation or integrity
fixity
considered layers 4-7
Firewall
Patch
Intrusion Detection System (IDS)
Web security that’s now antiquated
SSL
deprecated block cipher algo replaced by AES
IDEA
a symmetric algo widely used
AES
VPN (Virtual Private Network)
Rootkit
issues all certificates to end users
CA
a symmetric algorithm used for email and SMS
PGP
Phishing
highest block size for AES
256
This conceals data in another files such as graphics, audio or video file
Steganography
used by app developers; run at your own risk
code signing certs
DoD
inventor of the Internet
Tokenization
TFTP
port 69
Malware
Social Engineering
Incident Response
White Hat Hacker
revoked S/N that have been invalidated
CRL
completely prevents visibility of the data
Nulling
Asymmetric Algo generally used to generate a shared key over a public network
DH
Black Hat Hacker
cover multiple domains or URLs
SAN
pseudorandom value ensures that plaintext input does not produce the same ciphertext output, even when the same encryption key is used.
IV
used for PK encryption with DH and PGP
Elgamal
Biometric Authentication
Antivirus
port number for DNS
53
port used for emails
143
compares two inputs and produces a single binary output
XOR
one way mathematical function easy to compute but irreversible
Hashing
combining blocks and an IV using an XOR operation
CBC