WarningSignsIllegalAlertsDataBreachWPA3LearningContainmentVulnerabilitiesIdentificationMalwareDatabaseUnsecureNetworkLifeCycleRansomSpywareAdvancedPersistentThreatEradicationAnalyzationPreparationRisksSecurityUserDataUnauthorizedAccessCorporateDataThreatResponsePersonalDataProlongedAccessIoTFinancialDetrimentWarningSignsIllegalAlertsDataBreachWPA3LearningContainmentVulnerabilitiesIdentificationMalwareDatabaseUnsecureNetworkLifeCycleRansomSpywareAdvancedPersistentThreatEradicationAnalyzationPreparationRisksSecurityUserDataUnauthorizedAccessCorporateDataThreatResponsePersonalDataProlongedAccessIoTFinancialDetriment

APT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Warning Signs
  2. Illegal
  3. Alerts
  4. Data Breach
  5. WPA3
  6. Learning
  7. Containment
  8. Vulnerabilities
  9. Identification
  10. Malware
  11. Database
  12. Unsecure Network
  13. Life Cycle
  14. Ransom
  15. Spyware
  16. Advanced Persistent Threat
  17. Eradication
  18. Analyzation
  19. Preparation
  20. Risks
  21. Security
  22. User Data
  23. Unauthorized Access
  24. Corporate Data
  25. Threat Response
  26. Personal Data
  27. Prolonged Access
  28. IoT
  29. Financial Detriment