RansomAdvancedPersistentThreatIllegalEradicationIoTDatabaseDataBreachWPA3SpywareVulnerabilitiesIdentificationLifeCycleUnauthorizedAccessWarningSignsThreatResponseCorporateDataLearningSecurityUnsecureNetworkUserDataAlertsPreparationMalwareProlongedAccessFinancialDetrimentContainmentRisksAnalyzationPersonalDataRansomAdvancedPersistentThreatIllegalEradicationIoTDatabaseDataBreachWPA3SpywareVulnerabilitiesIdentificationLifeCycleUnauthorizedAccessWarningSignsThreatResponseCorporateDataLearningSecurityUnsecureNetworkUserDataAlertsPreparationMalwareProlongedAccessFinancialDetrimentContainmentRisksAnalyzationPersonalData

APT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Ransom
  2. Advanced Persistent Threat
  3. Illegal
  4. Eradication
  5. IoT
  6. Database
  7. Data Breach
  8. WPA3
  9. Spyware
  10. Vulnerabilities
  11. Identification
  12. Life Cycle
  13. Unauthorized Access
  14. Warning Signs
  15. Threat Response
  16. Corporate Data
  17. Learning
  18. Security
  19. Unsecure Network
  20. User Data
  21. Alerts
  22. Preparation
  23. Malware
  24. Prolonged Access
  25. Financial Detriment
  26. Containment
  27. Risks
  28. Analyzation
  29. Personal Data