EncryptionStrategicRiskFinancialRiskData lossprevention(DLP)systemDataMinimizationReputationalRiskDADTriadDetectiveControlsDisclosureDeterrentControlsComplianceRiskTokenizationCaesarCipherIntegrityTechnicalControlsCIATriadData inprocessingManagerialControlsMaskingPreventiveControlsOperationalRiskData inmotionControlObjectivesConfidentialityPhysicalControlsAlterationDe-identificationSecurityControlsOperationalControlsCorrectiveControlsDenialData AtRestSecurityincidentsCompensatingControlsAvailabilityEncryptionStrategicRiskFinancialRiskData lossprevention(DLP)systemDataMinimizationReputationalRiskDADTriadDetectiveControlsDisclosureDeterrentControlsComplianceRiskTokenizationCaesarCipherIntegrityTechnicalControlsCIATriadData inprocessingManagerialControlsMaskingPreventiveControlsOperationalRiskData inmotionControlObjectivesConfidentialityPhysicalControlsAlterationDe-identificationSecurityControlsOperationalControlsCorrectiveControlsDenialData AtRestSecurityincidentsCompensatingControlsAvailability

Sec+ Chapter 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Encryption
  2. Strategic Risk
  3. Financial Risk
  4. Data loss prevention (DLP) system
  5. Data Minimization
  6. Reputational Risk
  7. DAD Triad
  8. Detective Controls
  9. Disclosure
  10. Deterrent Controls
  11. Compliance Risk
  12. Tokenization
  13. Caesar Cipher
  14. Integrity
  15. Technical Controls
  16. CIA Triad
  17. Data in processing
  18. Managerial Controls
  19. Masking
  20. Preventive Controls
  21. Operational Risk
  22. Data in motion
  23. Control Objectives
  24. Confidentiality
  25. Physical Controls
  26. Alteration
  27. De-identification
  28. Security Controls
  29. Operational Controls
  30. Corrective Controls
  31. Denial
  32. Data At Rest
  33. Security incidents
  34. Compensating Controls
  35. Availability