ReputationalRiskDisclosurePhysicalControlsCIATriadSecurityincidentsDenialIntegrityComplianceRiskAlterationCompensatingControlsCorrectiveControlsAvailabilityMaskingDataMinimizationTokenizationCaesarCipherData AtRestDe-identificationEncryptionManagerialControlsData inmotionData inprocessingStrategicRiskDetectiveControlsOperationalRiskDADTriadData lossprevention(DLP)systemOperationalControlsConfidentialityControlObjectivesPreventiveControlsFinancialRiskDeterrentControlsSecurityControlsTechnicalControlsReputationalRiskDisclosurePhysicalControlsCIATriadSecurityincidentsDenialIntegrityComplianceRiskAlterationCompensatingControlsCorrectiveControlsAvailabilityMaskingDataMinimizationTokenizationCaesarCipherData AtRestDe-identificationEncryptionManagerialControlsData inmotionData inprocessingStrategicRiskDetectiveControlsOperationalRiskDADTriadData lossprevention(DLP)systemOperationalControlsConfidentialityControlObjectivesPreventiveControlsFinancialRiskDeterrentControlsSecurityControlsTechnicalControls

Sec+ Chapter 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Reputational Risk
  2. Disclosure
  3. Physical Controls
  4. CIA Triad
  5. Security incidents
  6. Denial
  7. Integrity
  8. Compliance Risk
  9. Alteration
  10. Compensating Controls
  11. Corrective Controls
  12. Availability
  13. Masking
  14. Data Minimization
  15. Tokenization
  16. Caesar Cipher
  17. Data At Rest
  18. De-identification
  19. Encryption
  20. Managerial Controls
  21. Data in motion
  22. Data in processing
  23. Strategic Risk
  24. Detective Controls
  25. Operational Risk
  26. DAD Triad
  27. Data loss prevention (DLP) system
  28. Operational Controls
  29. Confidentiality
  30. Control Objectives
  31. Preventive Controls
  32. Financial Risk
  33. Deterrent Controls
  34. Security Controls
  35. Technical Controls