ContainmentRansomPreparationWPA3IllegalPersonalDataDataBreachSecurityUnauthorizedAccessIdentificationMalwareEradicationProlongedAccessAlertsCorporateDataUserDataIoTVulnerabilitiesAnalyzationFinancialDetrimentAdvancedPersistentThreatDatabaseThreatResponseLifeCycleLearningUnsecureNetworkRisksSpywareWarningSignsContainmentRansomPreparationWPA3IllegalPersonalDataDataBreachSecurityUnauthorizedAccessIdentificationMalwareEradicationProlongedAccessAlertsCorporateDataUserDataIoTVulnerabilitiesAnalyzationFinancialDetrimentAdvancedPersistentThreatDatabaseThreatResponseLifeCycleLearningUnsecureNetworkRisksSpywareWarningSigns

APT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Containment
  2. Ransom
  3. Preparation
  4. WPA3
  5. Illegal
  6. Personal Data
  7. Data Breach
  8. Security
  9. Unauthorized Access
  10. Identification
  11. Malware
  12. Eradication
  13. Prolonged Access
  14. Alerts
  15. Corporate Data
  16. User Data
  17. IoT
  18. Vulnerabilities
  19. Analyzation
  20. Financial Detriment
  21. Advanced Persistent Threat
  22. Database
  23. Threat Response
  24. Life Cycle
  25. Learning
  26. Unsecure Network
  27. Risks
  28. Spyware
  29. Warning Signs