AuthenticationScamdatabaseInformationSecurityAccessControlMFASmishingPIIcomplianceRansomwareVishinglockoutProcedurespaymentgatewayBYODPretextingserversecurityAuthorizationPolicyCybersecurityLandscape12charactersinformationclassificationstandardsaccountabilitySocialMediaScamsOWASPAccessControlPolicycookiesTrojan80/20SensitivedataSocialEngineeringrestrictedPasswordDPABreachPrivacyRiskSDLCPhishingNetworksdatasecurityAuditSpearPhishingpaymentoptiondigitaldatainformationsystemsconfidentialserverApplicationSecuritySLAdataprivacyWormVulnerabilitybackupInternalUseGDPRVirusStandardscompromisevulnerabilityThreatcriticalfilesThreatLandscapePhishingGuidelinessecurityawarenessAuthenticationScamdatabaseInformationSecurityAccessControlMFASmishingPIIcomplianceRansomwareVishinglockoutProcedurespaymentgatewayBYODPretextingserversecurityAuthorizationPolicyCybersecurityLandscape12charactersinformationclassificationstandardsaccountabilitySocialMediaScamsOWASPAccessControlPolicycookiesTrojan80/20SensitivedataSocialEngineeringrestrictedPasswordDPABreachPrivacyRiskSDLCPhishingNetworksdatasecurityAuditSpearPhishingpaymentoptiondigitaldatainformationsystemsconfidentialserverApplicationSecuritySLAdataprivacyWormVulnerabilitybackupInternalUseGDPRVirusStandardscompromisevulnerabilityThreatcriticalfilesThreatLandscapePhishingGuidelinessecurityawareness

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
  1. Authentication
  2. Scam
  3. database
  4. Information Security
  5. Access Control
  6. MFA
  7. Smishing
  8. PII
  9. compliance
  10. Ransomware
  11. Vishing
  12. lockout
  13. Procedures
  14. payment gateway
  15. BYOD
  16. Pretexting
  17. server
  18. security
  19. Authorization
  20. Policy
  21. Cybersecurity Landscape
  22. 12 characters
  23. information classification standards
  24. accountability
  25. Social Media Scams
  26. OWASP
  27. Access Control Policy
  28. cookies
  29. Trojan
  30. 80/20
  31. Sensitive
  32. data
  33. Social Engineering
  34. restricted
  35. Password
  36. DPA
  37. Breach
  38. Privacy
  39. Risk
  40. SDLC
  41. Phishing
  42. Networks
  43. data security
  44. Audit
  45. Spear Phishing
  46. payment option
  47. digital data
  48. information systems
  49. confidential
  50. server
  51. Application Security
  52. SLA
  53. data privacy
  54. Worm
  55. Vulnerability
  56. backup
  57. Internal Use
  58. GDPR
  59. Virus
  60. Standards
  61. compromise
  62. vulnerability
  63. Threat
  64. critical files
  65. Threat Landscape
  66. Phishing
  67. Guidelines
  68. security awareness