Data lossprevention(DLP)systemManagerialControlsCorrectiveControlsAvailabilityCaesarCipherDataMinimizationFinancialRiskDeterrentControlsDisclosureComplianceRiskEncryptionIntegrityOperationalControlsTokenizationData AtRestDenialDetectiveControlsPreventiveControlsSecurityincidentsData inmotionStrategicRiskPhysicalControlsAlterationDADTriadCompensatingControlsMaskingReputationalRiskOperationalRiskTechnicalControlsCIATriadConfidentialityData inprocessingDe-identificationSecurityControlsControlObjectivesData lossprevention(DLP)systemManagerialControlsCorrectiveControlsAvailabilityCaesarCipherDataMinimizationFinancialRiskDeterrentControlsDisclosureComplianceRiskEncryptionIntegrityOperationalControlsTokenizationData AtRestDenialDetectiveControlsPreventiveControlsSecurityincidentsData inmotionStrategicRiskPhysicalControlsAlterationDADTriadCompensatingControlsMaskingReputationalRiskOperationalRiskTechnicalControlsCIATriadConfidentialityData inprocessingDe-identificationSecurityControlsControlObjectives

Sec+ Chapter 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Data loss prevention (DLP) system
  2. Managerial Controls
  3. Corrective Controls
  4. Availability
  5. Caesar Cipher
  6. Data Minimization
  7. Financial Risk
  8. Deterrent Controls
  9. Disclosure
  10. Compliance Risk
  11. Encryption
  12. Integrity
  13. Operational Controls
  14. Tokenization
  15. Data At Rest
  16. Denial
  17. Detective Controls
  18. Preventive Controls
  19. Security incidents
  20. Data in motion
  21. Strategic Risk
  22. Physical Controls
  23. Alteration
  24. DAD Triad
  25. Compensating Controls
  26. Masking
  27. Reputational Risk
  28. Operational Risk
  29. Technical Controls
  30. CIA Triad
  31. Confidentiality
  32. Data in processing
  33. De-identification
  34. Security Controls
  35. Control Objectives