DataMinimizationOperationalControlsComplianceRiskData lossprevention(DLP)systemStrategicRiskTechnicalControlsPreventiveControlsCIATriadControlObjectivesEncryptionFinancialRiskData inprocessingCorrectiveControlsSecurityincidentsCaesarCipherDe-identificationOperationalRiskMaskingDenialDisclosureReputationalRiskPhysicalControlsAvailabilityConfidentialityTokenizationManagerialControlsSecurityControlsData inmotionData AtRestCompensatingControlsIntegrityDADTriadDetectiveControlsDeterrentControlsAlterationDataMinimizationOperationalControlsComplianceRiskData lossprevention(DLP)systemStrategicRiskTechnicalControlsPreventiveControlsCIATriadControlObjectivesEncryptionFinancialRiskData inprocessingCorrectiveControlsSecurityincidentsCaesarCipherDe-identificationOperationalRiskMaskingDenialDisclosureReputationalRiskPhysicalControlsAvailabilityConfidentialityTokenizationManagerialControlsSecurityControlsData inmotionData AtRestCompensatingControlsIntegrityDADTriadDetectiveControlsDeterrentControlsAlteration

Sec+ Chapter 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Data Minimization
  2. Operational Controls
  3. Compliance Risk
  4. Data loss prevention (DLP) system
  5. Strategic Risk
  6. Technical Controls
  7. Preventive Controls
  8. CIA Triad
  9. Control Objectives
  10. Encryption
  11. Financial Risk
  12. Data in processing
  13. Corrective Controls
  14. Security incidents
  15. Caesar Cipher
  16. De-identification
  17. Operational Risk
  18. Masking
  19. Denial
  20. Disclosure
  21. Reputational Risk
  22. Physical Controls
  23. Availability
  24. Confidentiality
  25. Tokenization
  26. Managerial Controls
  27. Security Controls
  28. Data in motion
  29. Data At Rest
  30. Compensating Controls
  31. Integrity
  32. DAD Triad
  33. Detective Controls
  34. Deterrent Controls
  35. Alteration