ThreatResponseWPA3RansomLifeCycleSpywareRisksAlertsUnauthorizedAccessFinancialDetrimentIdentificationAdvancedPersistentThreatUnsecureNetworkSecurityLearningDatabasePersonalDataContainmentEradicationUserDataIllegalDataBreachAnalyzationPreparationIoTWarningSignsCorporateDataVulnerabilitiesMalwareProlongedAccessThreatResponseWPA3RansomLifeCycleSpywareRisksAlertsUnauthorizedAccessFinancialDetrimentIdentificationAdvancedPersistentThreatUnsecureNetworkSecurityLearningDatabasePersonalDataContainmentEradicationUserDataIllegalDataBreachAnalyzationPreparationIoTWarningSignsCorporateDataVulnerabilitiesMalwareProlongedAccess

APT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Threat Response
  2. WPA3
  3. Ransom
  4. Life Cycle
  5. Spyware
  6. Risks
  7. Alerts
  8. Unauthorized Access
  9. Financial Detriment
  10. Identification
  11. Advanced Persistent Threat
  12. Unsecure Network
  13. Security
  14. Learning
  15. Database
  16. Personal Data
  17. Containment
  18. Eradication
  19. User Data
  20. Illegal
  21. Data Breach
  22. Analyzation
  23. Preparation
  24. IoT
  25. Warning Signs
  26. Corporate Data
  27. Vulnerabilities
  28. Malware
  29. Prolonged Access