restrictedInformationSecurityVirussecurityawarenessWormThreatsecurityGuidelinesDPAMFARiskbackupPhishingNetworksPasswordBreachAccessControlGDPRBYODTrojanCybersecurityLandscapelockoutcompromiseVishingScampaymentoptionserverdataProceduresdigitaldatadatabaseSensitiveSocialEngineeringPolicySmishingdatasecurityInternalUseSocialMediaScams12charactersvulnerabilityinformationclassificationstandardsVulnerabilitySDLClockoutconfidentialdataprivacyinformationsystemsSpearPhishing80/20AccessControlPolicyPIIStandardsSLAcookiesThreatLandscapecriticalfilesaccountabilityRansomwarePhishingPretextingrestrictedInformationSecurityVirussecurityawarenessWormThreatsecurityGuidelinesDPAMFARiskbackupPhishingNetworksPasswordBreachAccessControlGDPRBYODTrojanCybersecurityLandscapelockoutcompromiseVishingScampaymentoptionserverdataProceduresdigitaldatadatabaseSensitiveSocialEngineeringPolicySmishingdatasecurityInternalUseSocialMediaScams12charactersvulnerabilityinformationclassificationstandardsVulnerabilitySDLClockoutconfidentialdataprivacyinformationsystemsSpearPhishing80/20AccessControlPolicyPIIStandardsSLAcookiesThreatLandscapecriticalfilesaccountabilityRansomwarePhishingPretexting

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. restricted
  2. Information Security
  3. Virus
  4. security awareness
  5. Worm
  6. Threat
  7. security
  8. Guidelines
  9. DPA
  10. MFA
  11. Risk
  12. backup
  13. Phishing
  14. Networks
  15. Password
  16. Breach
  17. Access Control
  18. GDPR
  19. BYOD
  20. Trojan
  21. Cybersecurity Landscape
  22. lockout
  23. compromise
  24. Vishing
  25. Scam
  26. payment option
  27. server
  28. data
  29. Procedures
  30. digital data
  31. database
  32. Sensitive
  33. Social Engineering
  34. Policy
  35. Smishing
  36. data security
  37. Internal Use
  38. Social Media Scams
  39. 12 characters
  40. vulnerability
  41. information classification standards
  42. Vulnerability
  43. SDLC
  44. lockout
  45. confidential
  46. data privacy
  47. information systems
  48. Spear Phishing
  49. 80/20
  50. Access Control Policy
  51. PII
  52. Standards
  53. SLA
  54. cookies
  55. Threat Landscape
  56. critical files
  57. accountability
  58. Ransomware
  59. Phishing
  60. Pretexting