OperationalRiskDenialManagerialControlsData AtRestDeterrentControlsSecurityincidentsConfidentialityTokenizationTechnicalControlsAlterationPhysicalControlsComplianceRiskCIATriadSecurityControlsIntegrityStrategicRiskPreventiveControlsData lossprevention(DLP)systemMaskingDADTriadControlObjectivesDetectiveControlsData inmotionFinancialRiskCaesarCipherData inprocessingAvailabilityDataMinimizationCorrectiveControlsCompensatingControlsEncryptionDisclosureDe-identificationOperationalControlsReputationalRiskOperationalRiskDenialManagerialControlsData AtRestDeterrentControlsSecurityincidentsConfidentialityTokenizationTechnicalControlsAlterationPhysicalControlsComplianceRiskCIATriadSecurityControlsIntegrityStrategicRiskPreventiveControlsData lossprevention(DLP)systemMaskingDADTriadControlObjectivesDetectiveControlsData inmotionFinancialRiskCaesarCipherData inprocessingAvailabilityDataMinimizationCorrectiveControlsCompensatingControlsEncryptionDisclosureDe-identificationOperationalControlsReputationalRisk

Sec+ Chapter 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Operational Risk
  2. Denial
  3. Managerial Controls
  4. Data At Rest
  5. Deterrent Controls
  6. Security incidents
  7. Confidentiality
  8. Tokenization
  9. Technical Controls
  10. Alteration
  11. Physical Controls
  12. Compliance Risk
  13. CIA Triad
  14. Security Controls
  15. Integrity
  16. Strategic Risk
  17. Preventive Controls
  18. Data loss prevention (DLP) system
  19. Masking
  20. DAD Triad
  21. Control Objectives
  22. Detective Controls
  23. Data in motion
  24. Financial Risk
  25. Caesar Cipher
  26. Data in processing
  27. Availability
  28. Data Minimization
  29. Corrective Controls
  30. Compensating Controls
  31. Encryption
  32. Disclosure
  33. De-identification
  34. Operational Controls
  35. Reputational Risk