AccessRestrictionTokenizationManagerialControlPermissionRestrictionCompensatingControlData LossPreventionSystemsGeographicRestrictionSegmentationAgent-lessDLPDataEncryptionDeterrentControlAgent-basedDLPDataMinimizationMaskingPreventativeControlIsolationPhysicalControlDatain UseCorrectiveControlDataat RestHashingDirectiveControlDetectiveControlData inTransitAccessRestrictionTokenizationManagerialControlPermissionRestrictionCompensatingControlData LossPreventionSystemsGeographicRestrictionSegmentationAgent-lessDLPDataEncryptionDeterrentControlAgent-basedDLPDataMinimizationMaskingPreventativeControlIsolationPhysicalControlDatain UseCorrectiveControlDataat RestHashingDirectiveControlDetectiveControlData inTransit

CHAPTER 1 SEC+ PART 2 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Access Restriction
  2. Tokenization
  3. Managerial Control
  4. Permission Restriction
  5. Compensating Control
  6. Data Loss Prevention Systems
  7. Geographic Restriction
  8. Segmentation
  9. Agent-less DLP
  10. Data Encryption
  11. Deterrent Control
  12. Agent-based DLP
  13. Data Minimization
  14. Masking
  15. Preventative Control
  16. Isolation
  17. Physical Control
  18. Data in Use
  19. Corrective Control
  20. Data at Rest
  21. Hashing
  22. Directive Control
  23. Detective Control
  24. Data in Transit