ProlongedAccessVulnerabilitiesPersonalDataRansomIdentificationSpywareIllegalLifeCycleEradicationSecurityPreparationLearningUnsecureNetworkMalwareIoTAlertsRisksCorporateDataFinancialDetrimentDatabaseWarningSignsUnauthorizedAccessContainmentWPA3UserDataAdvancedPersistentThreatAnalyzationDataBreachThreatResponseProlongedAccessVulnerabilitiesPersonalDataRansomIdentificationSpywareIllegalLifeCycleEradicationSecurityPreparationLearningUnsecureNetworkMalwareIoTAlertsRisksCorporateDataFinancialDetrimentDatabaseWarningSignsUnauthorizedAccessContainmentWPA3UserDataAdvancedPersistentThreatAnalyzationDataBreachThreatResponse

APT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Prolonged Access
  2. Vulnerabilities
  3. Personal Data
  4. Ransom
  5. Identification
  6. Spyware
  7. Illegal
  8. Life Cycle
  9. Eradication
  10. Security
  11. Preparation
  12. Learning
  13. Unsecure Network
  14. Malware
  15. IoT
  16. Alerts
  17. Risks
  18. Corporate Data
  19. Financial Detriment
  20. Database
  21. Warning Signs
  22. Unauthorized Access
  23. Containment
  24. WPA3
  25. User Data
  26. Advanced Persistent Threat
  27. Analyzation
  28. Data Breach
  29. Threat Response