TechnicalControlsConfidentialityMaskingComplianceRiskIntegrityCIATriadDeterrentControlsDADTriadData inmotionDataMinimizationCompensatingControlsOperationalRiskOperationalControlsData inprocessingData lossprevention(DLP)systemData AtRestEncryptionAlterationDisclosureSecurityControlsCorrectiveControlsStrategicRiskPreventiveControlsControlObjectivesSecurityincidentsManagerialControlsAvailabilityCaesarCipherDetectiveControlsReputationalRiskTokenizationFinancialRiskPhysicalControlsDenialDe-identificationTechnicalControlsConfidentialityMaskingComplianceRiskIntegrityCIATriadDeterrentControlsDADTriadData inmotionDataMinimizationCompensatingControlsOperationalRiskOperationalControlsData inprocessingData lossprevention(DLP)systemData AtRestEncryptionAlterationDisclosureSecurityControlsCorrectiveControlsStrategicRiskPreventiveControlsControlObjectivesSecurityincidentsManagerialControlsAvailabilityCaesarCipherDetectiveControlsReputationalRiskTokenizationFinancialRiskPhysicalControlsDenialDe-identification

Sec+ Chapter 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Technical Controls
  2. Confidentiality
  3. Masking
  4. Compliance Risk
  5. Integrity
  6. CIA Triad
  7. Deterrent Controls
  8. DAD Triad
  9. Data in motion
  10. Data Minimization
  11. Compensating Controls
  12. Operational Risk
  13. Operational Controls
  14. Data in processing
  15. Data loss prevention (DLP) system
  16. Data At Rest
  17. Encryption
  18. Alteration
  19. Disclosure
  20. Security Controls
  21. Corrective Controls
  22. Strategic Risk
  23. Preventive Controls
  24. Control Objectives
  25. Security incidents
  26. Managerial Controls
  27. Availability
  28. Caesar Cipher
  29. Detective Controls
  30. Reputational Risk
  31. Tokenization
  32. Financial Risk
  33. Physical Controls
  34. Denial
  35. De-identification