CompensatingControlsPhysicalControlsStrategicRiskCaesarCipherReputationalRiskData AtRestPreventiveControlsComplianceRiskAvailabilityEncryptionFinancialRiskDe-identificationTechnicalControlsMaskingControlObjectivesDeterrentControlsCIATriadDetectiveControlsOperationalRiskManagerialControlsDataMinimizationDenialTokenizationData lossprevention(DLP)systemAlterationDADTriadSecurityControlsData inprocessingData inmotionSecurityincidentsDisclosureOperationalControlsConfidentialityCorrectiveControlsIntegrityCompensatingControlsPhysicalControlsStrategicRiskCaesarCipherReputationalRiskData AtRestPreventiveControlsComplianceRiskAvailabilityEncryptionFinancialRiskDe-identificationTechnicalControlsMaskingControlObjectivesDeterrentControlsCIATriadDetectiveControlsOperationalRiskManagerialControlsDataMinimizationDenialTokenizationData lossprevention(DLP)systemAlterationDADTriadSecurityControlsData inprocessingData inmotionSecurityincidentsDisclosureOperationalControlsConfidentialityCorrectiveControlsIntegrity

Sec+ Chapter 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Compensating Controls
  2. Physical Controls
  3. Strategic Risk
  4. Caesar Cipher
  5. Reputational Risk
  6. Data At Rest
  7. Preventive Controls
  8. Compliance Risk
  9. Availability
  10. Encryption
  11. Financial Risk
  12. De-identification
  13. Technical Controls
  14. Masking
  15. Control Objectives
  16. Deterrent Controls
  17. CIA Triad
  18. Detective Controls
  19. Operational Risk
  20. Managerial Controls
  21. Data Minimization
  22. Denial
  23. Tokenization
  24. Data loss prevention (DLP) system
  25. Alteration
  26. DAD Triad
  27. Security Controls
  28. Data in processing
  29. Data in motion
  30. Security incidents
  31. Disclosure
  32. Operational Controls
  33. Confidentiality
  34. Corrective Controls
  35. Integrity