BYOD12charactersViruscookiescriticalfilesaccountabilityScamdigitaldataSensitiveNetworksinformationclassificationstandardsRiskdatasecurityconfidentialAccessControllockoutInternalUse80/20PhishingSocialMediaScamsPretextinginformationsystemsGDPRvulnerabilityVishingCybersecurityLandscapeRansomwareThreatlockoutsecuritydatabaseInformationSecurityTrojanbackupSocialEngineeringVulnerabilityStandardsSmishingdataprivacyBreachDPASLApaymentoptionGuidelinesMFASDLCsecurityawarenessPasswordSpearPhishingPolicydataserverAccessControlPolicyWormcompromiseThreatLandscapePIIProceduresPhishingrestrictedBYOD12charactersViruscookiescriticalfilesaccountabilityScamdigitaldataSensitiveNetworksinformationclassificationstandardsRiskdatasecurityconfidentialAccessControllockoutInternalUse80/20PhishingSocialMediaScamsPretextinginformationsystemsGDPRvulnerabilityVishingCybersecurityLandscapeRansomwareThreatlockoutsecuritydatabaseInformationSecurityTrojanbackupSocialEngineeringVulnerabilityStandardsSmishingdataprivacyBreachDPASLApaymentoptionGuidelinesMFASDLCsecurityawarenessPasswordSpearPhishingPolicydataserverAccessControlPolicyWormcompromiseThreatLandscapePIIProceduresPhishingrestricted

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. BYOD
  2. 12 characters
  3. Virus
  4. cookies
  5. critical files
  6. accountability
  7. Scam
  8. digital data
  9. Sensitive
  10. Networks
  11. information classification standards
  12. Risk
  13. data security
  14. confidential
  15. Access Control
  16. lockout
  17. Internal Use
  18. 80/20
  19. Phishing
  20. Social Media Scams
  21. Pretexting
  22. information systems
  23. GDPR
  24. vulnerability
  25. Vishing
  26. Cybersecurity Landscape
  27. Ransomware
  28. Threat
  29. lockout
  30. security
  31. database
  32. Information Security
  33. Trojan
  34. backup
  35. Social Engineering
  36. Vulnerability
  37. Standards
  38. Smishing
  39. data privacy
  40. Breach
  41. DPA
  42. SLA
  43. payment option
  44. Guidelines
  45. MFA
  46. SDLC
  47. security awareness
  48. Password
  49. Spear Phishing
  50. Policy
  51. data
  52. server
  53. Access Control Policy
  54. Worm
  55. compromise
  56. Threat Landscape
  57. PII
  58. Procedures
  59. Phishing
  60. restricted