Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

P V W H N X I K J H D C D S T A Z D Z B
N I V X D Z N T E Q B Y M E Z P I B L U
Q J S F Z J T P I T K X K L V W D K T E
O A R D E X X F G O G L K S T T L N A D
S U E R R Y R P O A L M K L I C I D H X
T Y L D U T V Q K U K P C Z Y R E I F L
F J I X S I O A D C U Q X Z P I D J S H
L A F F A L L K A F E J A E R Z S Y B C
D K O K E I N T V G Q E U E P Q L V Z O
R E R Y M B T O R E U L K N K C B R E N
W N P E R A S S E T B C P S V N E Y Y T
K V Y R E R C U B Y A B A M O J X K Q R
P T T U T E J C T H R E A T A G E N T O
H Y I S N N D I E G J K R L V G E W R L
A I R O U L R X F S D N P V M P Y S F M
U X U P O U Y V R A S N X V Q Q H U C L
M R C X C V D A K Y R O Q V Y L B O B M
R T E E Q D R A U G E F A S U B J E C T
L B S E C U R I T Y M O D E L B L A X T
Z A C L Z G F F W S Z C O N P Z D N L I
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # # # # # # # # # # # # # # # # # #
2# # # # # # # T # # # # # # # # # # # #
3# # # # # # # # I # # # K # # # # # T #
4# # # # E # # # # O # # # S T # # N # #
5# # E # R Y # # # # L # # # I C I # # #
6# # L # U T # # # # K P # # # R E # # #
7# # I # S I # # # C # # X # P # # J # #
8# # F # A L # # A # # # # E R # # # B C
9# # O # E I # T # # # # U E # # # # # O
10# # R # M B T # # # # L K # # # # # # N
11# # P E R A S S E T B C # # # # # # # T
12# # Y R E R C # # Y A # # # # # # # # R
13# # T U T E # C T H R E A T A G E N T O
14# # I S N N # I E # # # # # # # # # # L
15# # R O U L R # # S # # # # # # # # # #
16# # U P O U # # # # S # # # # # # # # #
17# # C X C V # # # # # # # # # # # # # #
18# # E E # D R A U G E F A S U B J E C T
19# # S E C U R I T Y M O D E L # # # # #
20# # # # # # # # # # # # # # # # # # # #
Word X Y Direction
ACCESS  611se
ASSET  611e
ATTACK  611ne
CONTROL  208s
COUNTERMEASURE  517n
EXPLOIT  148nw
EXPOSURE  418n
HACKER  1013ne
OBJECT  209nw
RISK  166nw
SAFEGUARD  1418w
SECURITYBLUEPRINT  1111ne
SECURITYMODEL  319e
SECURITYPROFILE  319n
SUBJECT  1418e
THREAT  913e
THREATAGENT  913e
VULNERABILITY  616n