ProlongedAccessAlertsAnalyzationLearningIllegalPreparationIoTDataBreachWPA3UnsecureNetworkPersonalDataDatabaseFinancialDetrimentCorporateDataUnauthorizedAccessIdentificationRisksMalwareContainmentRansomLifeCycleUserDataThreatResponseVulnerabilitiesEradicationSpywareWarningSignsSecurityAdvancedPersistentThreatProlongedAccessAlertsAnalyzationLearningIllegalPreparationIoTDataBreachWPA3UnsecureNetworkPersonalDataDatabaseFinancialDetrimentCorporateDataUnauthorizedAccessIdentificationRisksMalwareContainmentRansomLifeCycleUserDataThreatResponseVulnerabilitiesEradicationSpywareWarningSignsSecurityAdvancedPersistentThreat

APT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Prolonged Access
  2. Alerts
  3. Analyzation
  4. Learning
  5. Illegal
  6. Preparation
  7. IoT
  8. Data Breach
  9. WPA3
  10. Unsecure Network
  11. Personal Data
  12. Database
  13. Financial Detriment
  14. Corporate Data
  15. Unauthorized Access
  16. Identification
  17. Risks
  18. Malware
  19. Containment
  20. Ransom
  21. Life Cycle
  22. User Data
  23. Threat Response
  24. Vulnerabilities
  25. Eradication
  26. Spyware
  27. Warning Signs
  28. Security
  29. Advanced Persistent Threat