UnsecureNetworkUserDataFinancialDetrimentIdentificationAdvancedPersistentThreatIllegalCorporateDataAnalyzationRansomContainmentEradicationSpywareIoTPreparationDatabaseProlongedAccessAlertsSecurityRisksPersonalDataMalwareLifeCycleThreatResponseVulnerabilitiesLearningWPA3WarningSignsDataBreachUnauthorizedAccessUnsecureNetworkUserDataFinancialDetrimentIdentificationAdvancedPersistentThreatIllegalCorporateDataAnalyzationRansomContainmentEradicationSpywareIoTPreparationDatabaseProlongedAccessAlertsSecurityRisksPersonalDataMalwareLifeCycleThreatResponseVulnerabilitiesLearningWPA3WarningSignsDataBreachUnauthorizedAccess

APT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Unsecure Network
  2. User Data
  3. Financial Detriment
  4. Identification
  5. Advanced Persistent Threat
  6. Illegal
  7. Corporate Data
  8. Analyzation
  9. Ransom
  10. Containment
  11. Eradication
  12. Spyware
  13. IoT
  14. Preparation
  15. Database
  16. Prolonged Access
  17. Alerts
  18. Security
  19. Risks
  20. Personal Data
  21. Malware
  22. Life Cycle
  23. Threat Response
  24. Vulnerabilities
  25. Learning
  26. WPA3
  27. Warning Signs
  28. Data Breach
  29. Unauthorized Access