SmishingAuthenticationpaymentgatewaySocialMediaScamsSLACybersecurityLandscapeApplicationSecurityAuditRansomwareAccessControlsecurityWormcompliancePrivacySocialEngineeringPasswordStandardsAuthorizationGDPRVulnerabilityVirusRisklockoutTrojanserverdatacriticalfilesPretextingsecurityawarenessProceduresvulnerabilityDPAPolicyBreachdigitaldatabackupBYODThreatLandscapePhishingconfidentialpaymentoptionrestrictedAccessControlPolicyVishingSpearPhishingserverdataprivacyGuidelinesinformationsystems80/20ScamSDLCSensitiveinformationclassificationstandardsPIIcompromiseInformationSecurity12charactersOWASPcookiesThreatInternalUseNetworksdatasecurityaccountabilityMFAPhishingdatabaseSmishingAuthenticationpaymentgatewaySocialMediaScamsSLACybersecurityLandscapeApplicationSecurityAuditRansomwareAccessControlsecurityWormcompliancePrivacySocialEngineeringPasswordStandardsAuthorizationGDPRVulnerabilityVirusRisklockoutTrojanserverdatacriticalfilesPretextingsecurityawarenessProceduresvulnerabilityDPAPolicyBreachdigitaldatabackupBYODThreatLandscapePhishingconfidentialpaymentoptionrestrictedAccessControlPolicyVishingSpearPhishingserverdataprivacyGuidelinesinformationsystems80/20ScamSDLCSensitiveinformationclassificationstandardsPIIcompromiseInformationSecurity12charactersOWASPcookiesThreatInternalUseNetworksdatasecurityaccountabilityMFAPhishingdatabase

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
  1. Smishing
  2. Authentication
  3. payment gateway
  4. Social Media Scams
  5. SLA
  6. Cybersecurity Landscape
  7. Application Security
  8. Audit
  9. Ransomware
  10. Access Control
  11. security
  12. Worm
  13. compliance
  14. Privacy
  15. Social Engineering
  16. Password
  17. Standards
  18. Authorization
  19. GDPR
  20. Vulnerability
  21. Virus
  22. Risk
  23. lockout
  24. Trojan
  25. server
  26. data
  27. critical files
  28. Pretexting
  29. security awareness
  30. Procedures
  31. vulnerability
  32. DPA
  33. Policy
  34. Breach
  35. digital data
  36. backup
  37. BYOD
  38. Threat Landscape
  39. Phishing
  40. confidential
  41. payment option
  42. restricted
  43. Access Control Policy
  44. Vishing
  45. Spear Phishing
  46. server
  47. data privacy
  48. Guidelines
  49. information systems
  50. 80/20
  51. Scam
  52. SDLC
  53. Sensitive
  54. information classification standards
  55. PII
  56. compromise
  57. Information Security
  58. 12 characters
  59. OWASP
  60. cookies
  61. Threat
  62. Internal Use
  63. Networks
  64. data security
  65. accountability
  66. MFA
  67. Phishing
  68. database