Data inprocessingAlterationReputationalRiskIntegrityControlObjectivesOperationalControlsStrategicRiskDisclosureEncryptionCorrectiveControlsSecurityincidentsCompensatingControlsPreventiveControlsDenialPhysicalControlsAvailabilityCIATriadDataMinimizationConfidentialityDeterrentControlsOperationalRiskDADTriadSecurityControlsData AtRestComplianceRiskManagerialControlsData lossprevention(DLP)systemDetectiveControlsTechnicalControlsTokenizationFinancialRiskDe-identificationCaesarCipherData inmotionMaskingData inprocessingAlterationReputationalRiskIntegrityControlObjectivesOperationalControlsStrategicRiskDisclosureEncryptionCorrectiveControlsSecurityincidentsCompensatingControlsPreventiveControlsDenialPhysicalControlsAvailabilityCIATriadDataMinimizationConfidentialityDeterrentControlsOperationalRiskDADTriadSecurityControlsData AtRestComplianceRiskManagerialControlsData lossprevention(DLP)systemDetectiveControlsTechnicalControlsTokenizationFinancialRiskDe-identificationCaesarCipherData inmotionMasking

Sec+ Chapter 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Data in processing
  2. Alteration
  3. Reputational Risk
  4. Integrity
  5. Control Objectives
  6. Operational Controls
  7. Strategic Risk
  8. Disclosure
  9. Encryption
  10. Corrective Controls
  11. Security incidents
  12. Compensating Controls
  13. Preventive Controls
  14. Denial
  15. Physical Controls
  16. Availability
  17. CIA Triad
  18. Data Minimization
  19. Confidentiality
  20. Deterrent Controls
  21. Operational Risk
  22. DAD Triad
  23. Security Controls
  24. Data At Rest
  25. Compliance Risk
  26. Managerial Controls
  27. Data loss prevention (DLP) system
  28. Detective Controls
  29. Technical Controls
  30. Tokenization
  31. Financial Risk
  32. De-identification
  33. Caesar Cipher
  34. Data in motion
  35. Masking