Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

S E E Z X S M V L Q S B E P B E T A K X
S A F E G U A R D J J F R C Z C Y C T Z
U U U E E L I F O R P Y T I R U C E S Q
B O H Z Y B R B X K E R U S O P X E E V
J M H J L I J U K C W E H X D V C X C L
E G M Q A E A Z U Z K K M H I U O P U H
C D Q D C I S P I V O C I D R L U L R S
T S Y T I Z U I M A B A A I G N N O I L
J K T N E G A T A E R H T T G E T I T J
S A F H K E H P F T P Y W O T R E T Y K
A J A H S W N I N T B T E S S A R J M E
W K K O F A E N F L G A K W C B M N O E
J U K O Y K D A U I T D N C X I E Y D K
V I L S R Y C E C T J W E N V L A K E Q
J R A K I O P M Q F W S X N H I S D L E
Q U N J N R L O S A S A Q G Y T U Z Z N
L T R T I D W Q F W V T E R O Y R C A J
B J R N I G S W L T H R Q V X W E M C F
P O T J M X P A J C R U X V K X W M Q Q
L U T Q E K O B Z V I Y Q F H J O B M A
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # # # # # # # # # # # # # # # # # #
2S A F E G U A R D # # # # # # # # # # #
3U # # # E L I F O R P Y T I R U C E S #
4B # # # # # # B # # E R U S O P X E E #
5J # # # # # J # # # # E # # # V C X C #
6E # # # # E # # # # K K # # # U O P U #
7C # # # C # # # # # # C # # R L U L R #
8T # # T # # # # # # # A A I # N N O I #
9# # T N E G A T A E R H T T # E T I T #
10# # # # # # # # # # # Y # # T R E T Y #
11# # # # # # # # # # B T E S S A R # M #
12# # # # # # # # # L # # # # C B M # O #
13# # K # # # # # U # # # # C # I E # D #
14# # # S # # C E # # # # E # # L A # E #
15# # # # I O P # # # # S # # # I S # L #
16# # # # N R # # # # S # # # # T U # # #
17# # # T I # # # # # # # # # # Y R # # #
18# # R N # # # # # # # # # # # # E # # #
19# O T # # # # # # # # # # # # # # # # #
20L # # # # # # # # # # # # # # # # # # #
Word X Y Direction
ACCESS  1611sw
ASSET  1611w
ATTACK  1611nw
CONTROL  714sw
COUNTERMEASURE  175s
EXPLOIT  184s
EXPOSURE  184w
HACKER  129n
OBJECT  93sw
RISK  616nw
SAFEGUARD  12e
SECURITYBLUEPRINT  1111sw
SECURITYMODEL  193s
SECURITYPROFILE  193w
SUBJECT  12s
THREAT  139w
THREATAGENT  139w
VULNERABILITY  166s