AdvancedPersistentThreatRisksSecurityCorporateDataSpywareWPA3IoTUserDataUnauthorizedAccessVulnerabilitiesProlongedAccessIdentificationThreatResponseDatabaseAlertsContainmentFinancialDetrimentIllegalPreparationRansomUnsecureNetworkAnalyzationEradicationWarningSignsDataBreachLearningMalwareLifeCyclePersonalDataAdvancedPersistentThreatRisksSecurityCorporateDataSpywareWPA3IoTUserDataUnauthorizedAccessVulnerabilitiesProlongedAccessIdentificationThreatResponseDatabaseAlertsContainmentFinancialDetrimentIllegalPreparationRansomUnsecureNetworkAnalyzationEradicationWarningSignsDataBreachLearningMalwareLifeCyclePersonalData

APT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Advanced Persistent Threat
  2. Risks
  3. Security
  4. Corporate Data
  5. Spyware
  6. WPA3
  7. IoT
  8. User Data
  9. Unauthorized Access
  10. Vulnerabilities
  11. Prolonged Access
  12. Identification
  13. Threat Response
  14. Database
  15. Alerts
  16. Containment
  17. Financial Detriment
  18. Illegal
  19. Preparation
  20. Ransom
  21. Unsecure Network
  22. Analyzation
  23. Eradication
  24. Warning Signs
  25. Data Breach
  26. Learning
  27. Malware
  28. Life Cycle
  29. Personal Data