HashingDataMinimizationDetectiveControlDataEncryptionDataat RestManagerialControlAccessRestrictionCompensatingControlTokenizationData inTransitPhysicalControlPreventativeControlPermissionRestrictionDatain UseDeterrentControlData LossPreventionSystemsMaskingIsolationCorrectiveControlGeographicRestrictionAgent-lessDLPSegmentationDirectiveControlAgent-basedDLPHashingDataMinimizationDetectiveControlDataEncryptionDataat RestManagerialControlAccessRestrictionCompensatingControlTokenizationData inTransitPhysicalControlPreventativeControlPermissionRestrictionDatain UseDeterrentControlData LossPreventionSystemsMaskingIsolationCorrectiveControlGeographicRestrictionAgent-lessDLPSegmentationDirectiveControlAgent-basedDLP

CHAPTER 1 SEC+ PART 2 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Hashing
  2. Data Minimization
  3. Detective Control
  4. Data Encryption
  5. Data at Rest
  6. Managerial Control
  7. Access Restriction
  8. Compensating Control
  9. Tokenization
  10. Data in Transit
  11. Physical Control
  12. Preventative Control
  13. Permission Restriction
  14. Data in Use
  15. Deterrent Control
  16. Data Loss Prevention Systems
  17. Masking
  18. Isolation
  19. Corrective Control
  20. Geographic Restriction
  21. Agent-less DLP
  22. Segmentation
  23. Directive Control
  24. Agent-based DLP