AccessControlSensitivedatasecuritypaymentoptionserverAccessControlPolicySDLCBreachSocialEngineeringvulnerabilityThreatserverPasswordRiskSmishingrestrictedPhishingNetworkspaymentgatewaydataBYODStandardsSpearPhishingdatabasecookiesVishingTrojancomplianceAuditWormVulnerabilityDPARansomwareVirusinformationsystemsPrivacySLAAuthorizationGuidelinesApplicationSecurityThreatLandscape12characterssecurityProceduresScamPhishingPretextingCybersecurityLandscapePIIPolicyMFASocialMediaScamsinformationclassificationstandardsbackuplockout80/20AuthenticationInformationSecurityInternalUsedataprivacyaccountabilityOWASPconfidentialcriticalfilescompromiseGDPRsecurityawarenessdigitaldataAccessControlSensitivedatasecuritypaymentoptionserverAccessControlPolicySDLCBreachSocialEngineeringvulnerabilityThreatserverPasswordRiskSmishingrestrictedPhishingNetworkspaymentgatewaydataBYODStandardsSpearPhishingdatabasecookiesVishingTrojancomplianceAuditWormVulnerabilityDPARansomwareVirusinformationsystemsPrivacySLAAuthorizationGuidelinesApplicationSecurityThreatLandscape12characterssecurityProceduresScamPhishingPretextingCybersecurityLandscapePIIPolicyMFASocialMediaScamsinformationclassificationstandardsbackuplockout80/20AuthenticationInformationSecurityInternalUsedataprivacyaccountabilityOWASPconfidentialcriticalfilescompromiseGDPRsecurityawarenessdigitaldata

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
  1. Access Control
  2. Sensitive
  3. data security
  4. payment option
  5. server
  6. Access Control Policy
  7. SDLC
  8. Breach
  9. Social Engineering
  10. vulnerability
  11. Threat
  12. server
  13. Password
  14. Risk
  15. Smishing
  16. restricted
  17. Phishing
  18. Networks
  19. payment gateway
  20. data
  21. BYOD
  22. Standards
  23. Spear Phishing
  24. database
  25. cookies
  26. Vishing
  27. Trojan
  28. compliance
  29. Audit
  30. Worm
  31. Vulnerability
  32. DPA
  33. Ransomware
  34. Virus
  35. information systems
  36. Privacy
  37. SLA
  38. Authorization
  39. Guidelines
  40. Application Security
  41. Threat Landscape
  42. 12 characters
  43. security
  44. Procedures
  45. Scam
  46. Phishing
  47. Pretexting
  48. Cybersecurity Landscape
  49. PII
  50. Policy
  51. MFA
  52. Social Media Scams
  53. information classification standards
  54. backup
  55. lockout
  56. 80/20
  57. Authentication
  58. Information Security
  59. Internal Use
  60. data privacy
  61. accountability
  62. OWASP
  63. confidential
  64. critical files
  65. compromise
  66. GDPR
  67. security awareness
  68. digital data