Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

C G X N H C G G D C J Z O N F Q U G N K
G S M S B I R C I P L K D M E C O O S B
Q H K A S O D D T M X F P Z V W C L T C
G V D O W E I G N I O N G U L X D N B R
Z T E U Q D C D E C O N T R O L I Z O D
Z H L W P R J C G W B S U U Q R N A Z U
X N I D F A T T A T T A C K P L R Q V K
Y H F T D U U S T Y R F K E D V R R U A
N G O F H G S A A F E C U Z V G I Q P N
J R R N H E N L E T A L N T F U G K B Y
X E P E T F Y H R H B M F U A T S R B R
Q H Y R Q A K J H Y Q M I B D J I S Q W
O Y T U P S S T T Y X U B W V Z D Y W W
B L I S Z E I I W A K N D D A B K P Y R
J V R O M U R T C E J B U S E I K T L E
E X U P V U L N E R A B I L I T Y W X K
C I C X C O U N T E R M E A S U R E Y C
T Q E E X P L O I T H J O P Y A C F F A
L M S E C U R I T Y M O D E L B G A M H
Q M V N F M Q Z D R Q M Z M U R N Q F M
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # # # # # # # # # # # # # # # # # #
2# # # S # # # # # # # # # # # # # # # #
3# # # # S # # # T # # # # # # # # # T #
4# # # # # E # # N # # # # # # # # N # #
5# # E # # D C # E C O N T R O L I # # #
6# # L # # R # C G # # # # # # R # # # #
7# # I # # A # # A T T A C K P # # # # #
8# # F # # U # S T # # # # E # # # # # #
9# # O # # G S # A # # # U # # # # # # #
10# # R # # E # # E # # L # # # # # # # #
11# # P E T F # # R # B # # # # # # # # #
12# # Y R # A K # H Y # # # # # # # # # #
13O # T U # S S # T # # # # # # # # # # #
14B # I S # # I I # # # # # # # # # # # R
15J # R O # # R T C E J B U S # # # # # E
16E # U P V U L N E R A B I L I T Y # # K
17C # C X C O U N T E R M E A S U R E # C
18T # E E X P L O I T # # # # # # # # # A
19# # S E C U R I T Y M O D E L # # # # H
20# # # # # # # # # # # # # # # # # # # #
Word X Y Direction
ACCESS  97nw
ASSET  97sw
ATTACK  97e
CONTROL  105e
COUNTERMEASURE  517e
EXPLOIT  418e
EXPOSURE  418n
HACKER  2019n
OBJECT  113s
RISK  715n
SAFEGUARD  613n
SECURITYBLUEPRINT  1111ne
SECURITYMODEL  319e
SECURITYPROFILE  319n
SUBJECT  1415w
THREAT  913n
THREATAGENT  913n
VULNERABILITY  616e