dataGuidelinesNetworkssecuritySensitive80/20AuthorizationTrojancompromisebackupVulnerabilityRansomwareRiskBYODdatabaseCybersecurityLandscapeAccessControlGDPRrestrictedBreachApplicationSecurityPasswordcompliancePrivacyDPASpearPhishingAuditaccountabilityInternalUseProcedurespaymentgatewaySDLCconfidentialSocialMediaScamsScaminformationsystemsvulnerability12charactersdigitaldataAuthenticationserverVishinginformationclassificationstandardscriticalfilesVirusSLAInformationSecurityStandardsPhishingSmishingWormAccessControlPolicycookiesOWASPdataprivacyPretextingpaymentoptionsecurityawarenessserverThreatPhishingPIIMFAdatasecurityPolicySocialEngineeringlockoutThreatLandscapedataGuidelinesNetworkssecuritySensitive80/20AuthorizationTrojancompromisebackupVulnerabilityRansomwareRiskBYODdatabaseCybersecurityLandscapeAccessControlGDPRrestrictedBreachApplicationSecurityPasswordcompliancePrivacyDPASpearPhishingAuditaccountabilityInternalUseProcedurespaymentgatewaySDLCconfidentialSocialMediaScamsScaminformationsystemsvulnerability12charactersdigitaldataAuthenticationserverVishinginformationclassificationstandardscriticalfilesVirusSLAInformationSecurityStandardsPhishingSmishingWormAccessControlPolicycookiesOWASPdataprivacyPretextingpaymentoptionsecurityawarenessserverThreatPhishingPIIMFAdatasecurityPolicySocialEngineeringlockoutThreatLandscape

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
  1. data
  2. Guidelines
  3. Networks
  4. security
  5. Sensitive
  6. 80/20
  7. Authorization
  8. Trojan
  9. compromise
  10. backup
  11. Vulnerability
  12. Ransomware
  13. Risk
  14. BYOD
  15. database
  16. Cybersecurity Landscape
  17. Access Control
  18. GDPR
  19. restricted
  20. Breach
  21. Application Security
  22. Password
  23. compliance
  24. Privacy
  25. DPA
  26. Spear Phishing
  27. Audit
  28. accountability
  29. Internal Use
  30. Procedures
  31. payment gateway
  32. SDLC
  33. confidential
  34. Social Media Scams
  35. Scam
  36. information systems
  37. vulnerability
  38. 12 characters
  39. digital data
  40. Authentication
  41. server
  42. Vishing
  43. information classification standards
  44. critical files
  45. Virus
  46. SLA
  47. Information Security
  48. Standards
  49. Phishing
  50. Smishing
  51. Worm
  52. Access Control Policy
  53. cookies
  54. OWASP
  55. data privacy
  56. Pretexting
  57. payment option
  58. security awareness
  59. server
  60. Threat
  61. Phishing
  62. PII
  63. MFA
  64. data security
  65. Policy
  66. Social Engineering
  67. lockout
  68. Threat Landscape