VulnerabilityThreatLandscapePassworddatabaseVirusVishingMFAdigitaldatarestrictedPhishingSensitiveSLAsecurityservercompromisecriticalfilesTrojanaccountabilitySocialEngineeringThreatlockoutBYODWormRansomwarePretextingbackupSpearPhishinglockoutGDPRPolicy12characters80/20dataprivacyconfidentialAccessControlProceduresdatasecurityInformationSecurityinformationclassificationstandardscookiesInternalUseDPASocialMediaScamsGuidelinesAccessControlPolicyPIIRiskNetworksvulnerabilityPhishingSDLCSmishingpaymentoptionBreachsecurityawarenessScamStandardsinformationsystemsdataCybersecurityLandscapeVulnerabilityThreatLandscapePassworddatabaseVirusVishingMFAdigitaldatarestrictedPhishingSensitiveSLAsecurityservercompromisecriticalfilesTrojanaccountabilitySocialEngineeringThreatlockoutBYODWormRansomwarePretextingbackupSpearPhishinglockoutGDPRPolicy12characters80/20dataprivacyconfidentialAccessControlProceduresdatasecurityInformationSecurityinformationclassificationstandardscookiesInternalUseDPASocialMediaScamsGuidelinesAccessControlPolicyPIIRiskNetworksvulnerabilityPhishingSDLCSmishingpaymentoptionBreachsecurityawarenessScamStandardsinformationsystemsdataCybersecurityLandscape

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. Vulnerability
  2. Threat Landscape
  3. Password
  4. database
  5. Virus
  6. Vishing
  7. MFA
  8. digital data
  9. restricted
  10. Phishing
  11. Sensitive
  12. SLA
  13. security
  14. server
  15. compromise
  16. critical files
  17. Trojan
  18. accountability
  19. Social Engineering
  20. Threat
  21. lockout
  22. BYOD
  23. Worm
  24. Ransomware
  25. Pretexting
  26. backup
  27. Spear Phishing
  28. lockout
  29. GDPR
  30. Policy
  31. 12 characters
  32. 80/20
  33. data privacy
  34. confidential
  35. Access Control
  36. Procedures
  37. data security
  38. Information Security
  39. information classification standards
  40. cookies
  41. Internal Use
  42. DPA
  43. Social Media Scams
  44. Guidelines
  45. Access Control Policy
  46. PII
  47. Risk
  48. Networks
  49. vulnerability
  50. Phishing
  51. SDLC
  52. Smishing
  53. payment option
  54. Breach
  55. security awareness
  56. Scam
  57. Standards
  58. information systems
  59. data
  60. Cybersecurity Landscape