Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

P I H C R M W C L D U Q X K I F K B A A
Z O P E U I R U I B W E U Z P Q T R L W
F H I T E L I F O R P Y T I R U C E S Z
R T N R Q B I X V Z J T I O L P X E E L
X U S E R U S A E M R E T N U O C X C F
B N Z P Y T I L I B A R E N L U V P U Q
E I I A I H F C W C S T O E R G D O R X
F B S M D I G B C C S Z T I W R V S I N
J H D U K Y J E R P E M T A Y L E U T I
C W C D N P S Q R P T Y H H C S E R Y X
M L O P R S J X A L B T R A R K C E M S
J Z O I P J B B S L G P E T C E J B O B
D B K R L L M A U B O W A V Z K A C D Z
N Y O S T J Q E W M B M T K T N E T E T
P Z U O I N P G J Z Y W A J C L H R L B
J K F C L R O N P T N V G K E R T D K K
H V N B I U T C L T N N E I J R B N K B
F L J N N V T L V Q Y M N J B N A K U K
S T T Z A A E R I O M G T L U B Q Y L H
H H R R C T D R A U G E F A S P H M A S
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # # # # # # # # # # # # # # # # # #
2# # # # # # # # # # # # # # # # # # # #
3# # # # E L I F O R P Y T I R U C E S #
4# # # # # # # # # # # T I O L P X E E #
5# # # E R U S A E M R E T N U O C X C #
6# # # # Y T I L I B A R E N L U V P U #
7# # # # # # # # # C S T # # R # # O R #
8# # # # # # # # C # S # T I # # # S I #
9# # # # # # # E # # E # T A # # # U T #
10# # # # # # S # # # T Y H H C # # R Y #
11# L # # # S # # # # B # R A R K # E M #
12# # O # # # # # # L # # E T C E J B O #
13# # K R # # # # U # # # A # # K A # D #
14# # # S T # # E # # # # T # T # E T E #
15# # # # I N P # # # # # A # C # # R L #
16# # # # # R O # # # # # G # E # # # # #
17# # # # I # # C # # # # E # J # # # # #
18# # # N # # # # # # # # N # B # # # # #
19# # T # # # # # # # # # T # U # # # # #
20# # # # # # D R A U G E F A S # # # # #
Word X Y Direction
ACCESS  116sw
ASSET  116s
ATTACK  116se
CONTROL  817nw
COUNTERMEASURE  175w
EXPLOIT  184w
EXPOSURE  184s
HACKER  1310se
OBJECT  1912w
RISK  616nw
SAFEGUARD  1520w
SECURITYBLUEPRINT  1111sw
SECURITYMODEL  193s
SECURITYPROFILE  193w
SUBJECT  1520n
THREAT  139se
THREATAGENT  139s
VULNERABILITY  166w