AccessRestrictionIsolationAgent-lessDLPHashingDataat RestGeographicRestrictionPermissionRestrictionDeterrentControlCorrectiveControlDatain UseAgent-basedDLPSegmentationDetectiveControlCompensatingControlData LossPreventionSystemsPhysicalControlTokenizationDirectiveControlManagerialControlDataEncryptionMaskingDataMinimizationPreventativeControlData inTransitAccessRestrictionIsolationAgent-lessDLPHashingDataat RestGeographicRestrictionPermissionRestrictionDeterrentControlCorrectiveControlDatain UseAgent-basedDLPSegmentationDetectiveControlCompensatingControlData LossPreventionSystemsPhysicalControlTokenizationDirectiveControlManagerialControlDataEncryptionMaskingDataMinimizationPreventativeControlData inTransit

CHAPTER 1 SEC+ PART 2 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Access Restriction
  2. Isolation
  3. Agent-less DLP
  4. Hashing
  5. Data at Rest
  6. Geographic Restriction
  7. Permission Restriction
  8. Deterrent Control
  9. Corrective Control
  10. Data in Use
  11. Agent-based DLP
  12. Segmentation
  13. Detective Control
  14. Compensating Control
  15. Data Loss Prevention Systems
  16. Physical Control
  17. Tokenization
  18. Directive Control
  19. Managerial Control
  20. Data Encryption
  21. Masking
  22. Data Minimization
  23. Preventative Control
  24. Data in Transit