Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

K C R X J E J X D D X T X J N U P C Y Y
K F W M S Z C G J I G C R Z S Y J B P H
M D D Q K D L E D O M Y T I R U C E S O
K Z U O I P F U T W E R U S O P X E E K
F L G Y L C C R Y R S P U J N V C S C N
B U Q V P G W W E Y S B G B G U O A U C
H I K Z E I L H M K J S Z F R L U F R O
Y G H M Z T Y Z W E C H E I P N N E I F
K D V C Q P K C C U M A T C D E T G T R
Q L T O L L F T H Q Y Y H K C R E U Y H
E E K I C O Y X X T B Z R D M A R A P T
Y J W H V Q R I Y L M W E W U B M R R X
Y P K U C V T T U T B V A L T I E D O N
C P M S Z C V E N V T G T O D L A Q F G
C Y X X I S P X H O B E A M A I S W I K
M G T Q U R S P M B C S G T H T U Q L P
Z M D Z I P P L P J S Q E R T Y R D E Q
M X H N J M U O P E R T N G V A E C S C
Z Q T T M E V I T C G P T H X A C N M E
R E G X W N Q T Z T M E O V R H E K O T
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # # # # # # # # # # # # # # # # # #
2# # # # # # # # # # # # # # # # # # # #
3# # # # # # L E D O M Y T I R U C E S #
4# # # # # # # # # # E R U S O P X E E #
5# # # # # # # R # # # # U # # V C S C #
6# # # # # # # # E # S B # # # U O A U #
7# # # # # # # # # K J S # # R L U F R #
8# # # # # # # # # E C # E I # N N E I #
9# # # # # # # # C # # A T C # E T G T #
10# # # # L # # T # # # Y H # C R E U Y #
11# # # # # O # # # # B # R # # A R A P #
12# # # # # # R # # L # # E # # B M R R #
13# # K # # # # T U # # # A # # I E D O #
14# # # S # # # E N # # # T # # L A # F #
15# # # # I # P X # O # # A # # I S # I #
16# # # # # R # P # B C S G T # T U # L #
17# # # # I # # L # J S # E # T Y R # E #
18# # # N # # # O # E # # N # # A E # # #
19# # T # # # # I T C # # T # # # C # # #
20# # # # # # # T # T # # # # # # # K # #
Word X Y Direction
ACCESS  1611nw
ASSET  1315sw
ATTACK  1315se
CONTROL  1116nw
COUNTERMEASURE  175s
EXPLOIT  814s
EXPOSURE  184w
HACKER  1310nw
OBJECT  1015s
RISK  616nw
SAFEGUARD  185s
SECURITYBLUEPRINT  1111sw
SECURITYMODEL  193w
SECURITYPROFILE  193s
SUBJECT  144sw
THREAT  139s
THREATAGENT  139s
VULNERABILITY  166s