Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

G U W P J F S F M A H U F F M A E N S R
V P Y F W Y O J R H Y R G O M S W M L X
A S T O C Q F I K A S S L O R T N O C O
D C W N J Z V P H A K V C P P V E E T M
Z S U R I Z L M M U D L K N H Y R E C I
Z D K S I R D F S X S T X T W T U D S P
F H Y E D B P A Y U D S Q G W I S G L I
Z E X B L B F E V U B H E G R L A O E F
P X Z O X E E D U I I J Z C S I E C D T
T S F E G P Z B S L F Z E V C B M G O V
T P Z U Z H H B K O B H O C A A R E M M
O A A Y R J J X M C A Y Q V T R E R Y M
H R T N E G A T A E R H T T W E T U T W
D W G T D J K S X Q A F A I J N N S I F
D L G N C I S D R C P C F S R L U O R T
O W M W T E U N K V K N F G Q U O P U F
L V R P T Y J E J Z T X M S L V C X C M
S F Q B Y F R B F S T T I O L P X E E B
X O M R E L I F O R P Y T I R U C E S P
S O A A X S T T O M E W R H C B R N F G
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # # # # # # # # # # # # # # # # # #
2# # # # # # # # # # # # # # # # # # # #
3# # T # # # # # # # # # L O R T N O C #
4# # # N # # # # # # # # # # # # E # # #
5# # # # I # # # # # # # # # # Y R # # #
6# # K S I R # # S # S # # # # T U # # #
7# # # # # # P A # U # S # # # I S # L #
8# # # # # # F E # # B # E # # L A # E #
9# # # # # E # # U # # J # C # I E # D #
10# # # # G # # # # L # # E # C B M # O #
11# # # U # # # # # # B # # C # A R E M #
12# # A # # # # # # # # Y # # T R E R Y #
13# R T N E G A T A E R H T T # E T U T #
14D # # T # # # S # # A # A I # N N S I #
15# # # # C # S # # C # C # # R L U O R #
16# # # # # E # # K # K # # # # U O P U #
17# # # # T # J E # # # # # # # V C X C #
18# # # # # # R B # # # T I O L P X E E #
19# # # # E L I F O R P Y T I R U C E S #
20# # # # # # # # # # # # # # # # # # # #
Word X Y Direction
ACCESS  1611nw
ASSET  913sw
ATTACK  1611sw
CONTROL  193w
COUNTERMEASURE  1717n
EXPLOIT  1818w
EXPOSURE  1818n
HACKER  1213sw
OBJECT  919nw
RISK  66w
SAFEGUARD  96sw
SECURITYBLUEPRINT  1111nw
SECURITYMODEL  1919n
SECURITYPROFILE  1919w
SUBJECT  96se
THREAT  1313w
THREATAGENT  1313w
VULNERABILITY  1616n