StrategicRiskDenialDADTriadData inmotionDetectiveControlsCorrectiveControlsSecurityincidentsConfidentialityComplianceRiskAlterationOperationalControlsData AtRestPhysicalControlsCaesarCipherManagerialControlsTechnicalControlsOperationalRiskDeterrentControlsDisclosureCIATriadSecurityControlsEncryptionFinancialRiskMaskingControlObjectivesReputationalRiskTokenizationPreventiveControlsCompensatingControlsDe-identificationData inprocessingDataMinimizationData lossprevention(DLP)systemAvailabilityIntegrityStrategicRiskDenialDADTriadData inmotionDetectiveControlsCorrectiveControlsSecurityincidentsConfidentialityComplianceRiskAlterationOperationalControlsData AtRestPhysicalControlsCaesarCipherManagerialControlsTechnicalControlsOperationalRiskDeterrentControlsDisclosureCIATriadSecurityControlsEncryptionFinancialRiskMaskingControlObjectivesReputationalRiskTokenizationPreventiveControlsCompensatingControlsDe-identificationData inprocessingDataMinimizationData lossprevention(DLP)systemAvailabilityIntegrity

Sec+ Chapter 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Strategic Risk
  2. Denial
  3. DAD Triad
  4. Data in motion
  5. Detective Controls
  6. Corrective Controls
  7. Security incidents
  8. Confidentiality
  9. Compliance Risk
  10. Alteration
  11. Operational Controls
  12. Data At Rest
  13. Physical Controls
  14. Caesar Cipher
  15. Managerial Controls
  16. Technical Controls
  17. Operational Risk
  18. Deterrent Controls
  19. Disclosure
  20. CIA Triad
  21. Security Controls
  22. Encryption
  23. Financial Risk
  24. Masking
  25. Control Objectives
  26. Reputational Risk
  27. Tokenization
  28. Preventive Controls
  29. Compensating Controls
  30. De-identification
  31. Data in processing
  32. Data Minimization
  33. Data loss prevention (DLP) system
  34. Availability
  35. Integrity