Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

S Y T D I N T U U I G Q L W Q T I T C W
E P A U Y X W R X R E K C A H Z N Y C Y
C J T B U Z J I K L A R J M N A H Z D R
G S P N B S B S P L U D G N K A R L U P
C P U K I H I B H J F B P T X I E V E M
P U A U A R Y J M T O I J B M X O W L G
T Z L A N U P D F Y U I M I D U G J I M
I T I O L P X E K J M U C D J P J C F O
H K T W T N W Q U R K V G T C E J B O D
K T V L Q E E D A L E X N N F P Z T R R
X M H F Q L S B R Z B I L T O K W U P A
J C W G E H F S E J K Y G O C O B Z Y U
D C T N E G A T A E R H T A R E T L T G
T O H Y G C T E C V F M T I N T J Y I E
N C J Y C L P H C O N T K E R Y N B R F
S F F E Y T I L I B A R E N L U V O U A
I M S E R U S A E M R E T N U O C V C S
E S Y W J X S I E N E R U S O P X E E Y
U R P C K P L E D O M Y T I R U C E S B
A T R A Y Z Q T T J A X Y N J A E V E H
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # # # # # # # # # # # # # # # # # #
2# # # # # # # # # R E K C A H # # # # #
3# # T # # # # # K # # # # # # # # # # #
4# # # N # # # S # # # # # # # # # # # #
5# # # # I # I # # # # # # # # # # # E #
6# # # # # R # # # # # # # # # # # # L #
7# # # # # # P # # # # # # # # # # # I #
8# T I O L P X E # # # # # # # # # # F #
9# # # # T # # # U # # # # T C E J B O D
10# # # # # E # # # L # # # # # # # # R R
11# # # # # # S # # # B # L T # K # # P A
12# # # # # # # S # # # Y # O C # # # Y U
13# # T N E G A T A E R H T A R E # # T G
14# # # # # C # # # # # # T I # T J # I E
15# # # # C # # # # # # T # # R # N B R F
16# # # E Y T I L I B A R E N L U V O U A
17# # S E R U S A E M R E T N U O C # C S
18# S # # # # # # # # E R U S O P X E E #
19# # # # # # L E D O M Y T I R U C E S #
20# # # # # # # # # # # # # # # # # # # #
Word X Y Direction
ACCESS  713sw
ASSET  913nw
ATTACK  1116ne
CONTROL  1917nw
COUNTERMEASURE  1717w
EXPLOIT  88w
EXPOSURE  1818w
HACKER  152w
OBJECT  199w
RISK  66ne
SAFEGUARD  2017n
SECURITYBLUEPRINT  1111nw
SECURITYMODEL  1919w
SECURITYPROFILE  1919n
SUBJECT  2017nw
THREAT  1313w
THREATAGENT  1313w
VULNERABILITY  1616w