ManagerialControlsPreventiveControlsData lossprevention(DLP)systemOperationalControlsTokenizationDenialDataMinimizationConfidentialityIntegrityCorrectiveControlsDADTriadControlObjectivesData AtRestPhysicalControlsSecurityincidentsCompensatingControlsTechnicalControlsData inmotionDe-identificationFinancialRiskCIATriadReputationalRiskSecurityControlsEncryptionDisclosureOperationalRiskDeterrentControlsStrategicRiskAvailabilityDetectiveControlsData inprocessingAlterationMaskingCaesarCipherComplianceRiskManagerialControlsPreventiveControlsData lossprevention(DLP)systemOperationalControlsTokenizationDenialDataMinimizationConfidentialityIntegrityCorrectiveControlsDADTriadControlObjectivesData AtRestPhysicalControlsSecurityincidentsCompensatingControlsTechnicalControlsData inmotionDe-identificationFinancialRiskCIATriadReputationalRiskSecurityControlsEncryptionDisclosureOperationalRiskDeterrentControlsStrategicRiskAvailabilityDetectiveControlsData inprocessingAlterationMaskingCaesarCipherComplianceRisk

Sec+ Chapter 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Managerial Controls
  2. Preventive Controls
  3. Data loss prevention (DLP) system
  4. Operational Controls
  5. Tokenization
  6. Denial
  7. Data Minimization
  8. Confidentiality
  9. Integrity
  10. Corrective Controls
  11. DAD Triad
  12. Control Objectives
  13. Data At Rest
  14. Physical Controls
  15. Security incidents
  16. Compensating Controls
  17. Technical Controls
  18. Data in motion
  19. De-identification
  20. Financial Risk
  21. CIA Triad
  22. Reputational Risk
  23. Security Controls
  24. Encryption
  25. Disclosure
  26. Operational Risk
  27. Deterrent Controls
  28. Strategic Risk
  29. Availability
  30. Detective Controls
  31. Data in processing
  32. Alteration
  33. Masking
  34. Caesar Cipher
  35. Compliance Risk