Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

V Q A U D Z M D I I S G W O N A Y D K R
T V B X W K N U C W C S N M X Z K Q X J
K S S E C U R I T Y P R O F I L E V U H
O G E E X P O S U R E J F B E H D M E D
W B C X C V Z H Z H G Q V U J T P S P M
G S U P O U O Q B M K D I L U E D L F R
R A R L U L R T K C P G F B A J C N K V
W F I O N N I I A N M G Q I A F L T G E
W E T I T E E T T H R E A T A G E N T G
A G Y T E R T T B Y A G T W N G P X H N
U U M Q R A Y M V R B C W C U N H Y J B
L A O R M B C F L C U L K B E J B T N Z
M R D T E I L C I L E G U E M J L Q M R
O D E Y A L R S E H O P E E R P B Y Z E
Z N L S S I Q K Z S L R P D P W C U V A
P S S N U T A X G N S T T D D R R B S I
G E J U R Y G A O E F E A N I T I E F Q
T V D Z E W S P A P Z P Y S O K H N L M
Q O M D L D J N T L S R K X L C R F T X
N M C K B M P J A S W L K Q J L M G D D
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # # # # # # # # # # # # # # # # # #
2# # # # # # # # # # # # # # # # # # # #
3# # S E C U R I T Y P R O F I L E # # #
4# # E E X P O S U R E # # B # # # # # #
5# # C X C V # # # # # # # # J # # # # #
6# S U P O U # # # # K # # # # E # # # #
7# A R L U L R # # C # # # # # # C # # #
8# F I O N N # I A # # # # # # # # T # #
9# E T I T E # T T H R E A T A G E N T #
10# G Y T E R T # # Y A # T # # # # # # #
11# U M # R A # # # # B C # C # # # # # #
12# A O # M B C # # # # L K # E # # # # #
13# R D # E I # C # L # # U E # J # # # #
14# D E # A L # # E # O # # E R # B # # #
15# # L S S I # # # S # R # # P # # U # #
16# # S # U T # # # # S # T # # R # # S #
17# E # # R Y # # # # # # # N I # I # # #
18T # # # E # # # # # # # # S O # # N # #
19# # # # # # # # # # # # K # # C # # T #
20# # # # # # # # # # # # # # # # # # # #
Word X Y Direction
ACCESS  611se
ASSET  514sw
ATTACK  611ne
CONTROL  1619nw
COUNTERMEASURE  55s
EXPLOIT  44s
EXPOSURE  44e
HACKER  109se
OBJECT  133se
RISK  1616sw
SAFEGUARD  26s
SECURITYBLUEPRINT  1111se
SECURITYMODEL  33s
SECURITYPROFILE  33e
SUBJECT  1916nw
THREAT  99e
THREATAGENT  99e
VULNERABILITY  66s