DisclosureStrategicRiskReputationalRiskPreventiveControlsPhysicalControlsDetectiveControlsComplianceRiskSecurityincidentsOperationalControlsData inmotionOperationalRiskEncryptionIntegrityCorrectiveControlsManagerialControlsAvailabilitySecurityControlsCompensatingControlsCIATriadDeterrentControlsDataMinimizationData inprocessingDe-identificationDADTriadDenialControlObjectivesAlterationData lossprevention(DLP)systemTechnicalControlsTokenizationMaskingCaesarCipherConfidentialityFinancialRiskData AtRestDisclosureStrategicRiskReputationalRiskPreventiveControlsPhysicalControlsDetectiveControlsComplianceRiskSecurityincidentsOperationalControlsData inmotionOperationalRiskEncryptionIntegrityCorrectiveControlsManagerialControlsAvailabilitySecurityControlsCompensatingControlsCIATriadDeterrentControlsDataMinimizationData inprocessingDe-identificationDADTriadDenialControlObjectivesAlterationData lossprevention(DLP)systemTechnicalControlsTokenizationMaskingCaesarCipherConfidentialityFinancialRiskData AtRest

Sec+ Chapter 1 Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. Disclosure
  2. Strategic Risk
  3. Reputational Risk
  4. Preventive Controls
  5. Physical Controls
  6. Detective Controls
  7. Compliance Risk
  8. Security incidents
  9. Operational Controls
  10. Data in motion
  11. Operational Risk
  12. Encryption
  13. Integrity
  14. Corrective Controls
  15. Managerial Controls
  16. Availability
  17. Security Controls
  18. Compensating Controls
  19. CIA Triad
  20. Deterrent Controls
  21. Data Minimization
  22. Data in processing
  23. De-identification
  24. DAD Triad
  25. Denial
  26. Control Objectives
  27. Alteration
  28. Data loss prevention (DLP) system
  29. Technical Controls
  30. Tokenization
  31. Masking
  32. Caesar Cipher
  33. Confidentiality
  34. Financial Risk
  35. Data At Rest