Data in processing Alteration Reputational Risk Integrity Control Objectives Operational Controls Strategic Risk Disclosure Encryption Corrective Controls Security incidents Compensating Controls Preventive Controls Denial Physical Controls Availability CIA Triad Data Minimization Confidentiality Deterrent Controls Operational Risk DAD Triad Security Controls Data At Rest Compliance Risk Managerial Controls Data loss prevention (DLP) system Detective Controls Technical Controls Tokenization Financial Risk De- identification Caesar Cipher Data in motion Masking Data in processing Alteration Reputational Risk Integrity Control Objectives Operational Controls Strategic Risk Disclosure Encryption Corrective Controls Security incidents Compensating Controls Preventive Controls Denial Physical Controls Availability CIA Triad Data Minimization Confidentiality Deterrent Controls Operational Risk DAD Triad Security Controls Data At Rest Compliance Risk Managerial Controls Data loss prevention (DLP) system Detective Controls Technical Controls Tokenization Financial Risk De- identification Caesar Cipher Data in motion Masking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data in processing
Alteration
Reputational Risk
Integrity
Control Objectives
Operational Controls
Strategic Risk
Disclosure
Encryption
Corrective Controls
Security incidents
Compensating Controls
Preventive Controls
Denial
Physical Controls
Availability
CIA Triad
Data Minimization
Confidentiality
Deterrent Controls
Operational Risk
DAD Triad
Security Controls
Data At Rest
Compliance Risk
Managerial Controls
Data loss prevention (DLP) system
Detective Controls
Technical Controls
Tokenization
Financial Risk
De-identification
Caesar Cipher
Data in motion
Masking