ProlongedAccessIdentificationRisksVulnerabilitiesMalwarePreparationFinancialDetrimentLearningThreatResponseUnsecureNetworkUserDataWarningSignsSecurityCorporateDataDataBreachContainmentDatabaseAlertsAdvancedPersistentThreatSpywareIoTIllegalEradicationAnalyzationWPA3RansomUnauthorizedAccessPersonalDataLifeCycleProlongedAccessIdentificationRisksVulnerabilitiesMalwarePreparationFinancialDetrimentLearningThreatResponseUnsecureNetworkUserDataWarningSignsSecurityCorporateDataDataBreachContainmentDatabaseAlertsAdvancedPersistentThreatSpywareIoTIllegalEradicationAnalyzationWPA3RansomUnauthorizedAccessPersonalDataLifeCycle

APT Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Prolonged Access
  2. Identification
  3. Risks
  4. Vulnerabilities
  5. Malware
  6. Preparation
  7. Financial Detriment
  8. Learning
  9. Threat Response
  10. Unsecure Network
  11. User Data
  12. Warning Signs
  13. Security
  14. Corporate Data
  15. Data Breach
  16. Containment
  17. Database
  18. Alerts
  19. Advanced Persistent Threat
  20. Spyware
  21. IoT
  22. Illegal
  23. Eradication
  24. Analyzation
  25. WPA3
  26. Ransom
  27. Unauthorized Access
  28. Personal Data
  29. Life Cycle