IoTAlertsEradicationAdvancedPersistentThreatRisksFinancialDetrimentUnsecureNetworkContainmentSpywareRansomDataBreachLearningVulnerabilitiesIllegalSecurityAnalyzationProlongedAccessUserDataLifeCycleWPA3MalwarePersonalDataIdentificationWarningSignsUnauthorizedAccessPreparationThreatResponseDatabaseCorporateDataIoTAlertsEradicationAdvancedPersistentThreatRisksFinancialDetrimentUnsecureNetworkContainmentSpywareRansomDataBreachLearningVulnerabilitiesIllegalSecurityAnalyzationProlongedAccessUserDataLifeCycleWPA3MalwarePersonalDataIdentificationWarningSignsUnauthorizedAccessPreparationThreatResponseDatabaseCorporateData

APT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. IoT
  2. Alerts
  3. Eradication
  4. Advanced Persistent Threat
  5. Risks
  6. Financial Detriment
  7. Unsecure Network
  8. Containment
  9. Spyware
  10. Ransom
  11. Data Breach
  12. Learning
  13. Vulnerabilities
  14. Illegal
  15. Security
  16. Analyzation
  17. Prolonged Access
  18. User Data
  19. Life Cycle
  20. WPA3
  21. Malware
  22. Personal Data
  23. Identification
  24. Warning Signs
  25. Unauthorized Access
  26. Preparation
  27. Threat Response
  28. Database
  29. Corporate Data