TokenizationPermissionRestrictionDataMinimizationIsolationPhysicalControlCorrectiveControlData LossPreventionSystemsAgent-basedDLPDeterrentControlDirectiveControlCompensatingControlSegmentationHashingManagerialControlDatain UseData inTransitGeographicRestrictionDetectiveControlPreventativeControlDataEncryptionAccessRestrictionAgent-lessDLPMaskingDataat RestTokenizationPermissionRestrictionDataMinimizationIsolationPhysicalControlCorrectiveControlData LossPreventionSystemsAgent-basedDLPDeterrentControlDirectiveControlCompensatingControlSegmentationHashingManagerialControlDatain UseData inTransitGeographicRestrictionDetectiveControlPreventativeControlDataEncryptionAccessRestrictionAgent-lessDLPMaskingDataat Rest

CHAPTER 1 SEC+ PART 2 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Tokenization
  2. Permission Restriction
  3. Data Minimization
  4. Isolation
  5. Physical Control
  6. Corrective Control
  7. Data Loss Prevention Systems
  8. Agent-based DLP
  9. Deterrent Control
  10. Directive Control
  11. Compensating Control
  12. Segmentation
  13. Hashing
  14. Managerial Control
  15. Data in Use
  16. Data in Transit
  17. Geographic Restriction
  18. Detective Control
  19. Preventative Control
  20. Data Encryption
  21. Access Restriction
  22. Agent-less DLP
  23. Masking
  24. Data at Rest