Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

D K R D V C O E G N U G K F U M B N C Q
G V N P H E J O X F E C G B I S A Q B D
V K S E C U R I T Y M O D E L Q N I P P
W Q E E E O O Z V K B S A F E G U A R D
I C C X C V N N F J F Y U R M K V B V F
L B U P O U C T E U S B E B Q H Y V O G
V Q R O U L R C R S D K J J J L W H O W
F X I S N N T I E O C N D H Y E F L S K
E F T U T E F C T A L B G Y P E C L S Y
Q B Y R E R C X H Y L B Y H U X U T A A
F H P E R A N F R V B V S D N W Y H R U
R V R B M B O O E O Z L T P X N E U D N
A C O V E I Q Q A H A H U U X K Q C Z N
T M F Q A L Y C T S R P X E M P L G E M
P X I Z S I S Q A I S Q X X P K A F G Q
K V L N U T Y T G M I E F P N R I S K U
W Y E B R Y T B E R O O T L A M I C U T
S N O W E A P S N M F X U O G X U N B J
H J C S C O G B T N T W D I T P Y C T I
D F C K E F H L A O E T Y T H P D I X Q
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # # # # # # # # # # # # # # # # # #
2# # # # # # # # # # # # # # # # # # # #
3# # S E C U R I T Y M O D E L # # # # #
4# # E E # O # # # # B S A F E G U A R D
5# # C X C V N # # J # # U R # # # # # #
6# # U P O U # T E # S # E B # # # # # #
7# # R O U L R C R S # K # # J # # # # #
8# # I S N N T I E O C # # # # E # # # #
9# # T U T E # C T A L # # # # # C # # #
10# # Y R E R C # H Y # # # # # # # T # #
11# # P E R A # # R # B # # # # # # # # #
12# # R # M B # # E # # L # # # # # # # #
13# # O # E I # # A # # # U # # # # # # #
14# # F # A L # # T S # # # E # # # # # #
15# # I # S I # # A # S # # X P # # # # #
16# # L # U T # T G # # E # P # R I S K #
17# # E # R Y T # E # # # T L # # I # # #
18# # # # E A # # N # # # # O # # # N # #
19# # # # C # # # T # # # # I # # # # T #
20# # # K # # # # # # # # # T # # # # # #
Word X Y Direction
ACCESS  611ne
ASSET  913se
ATTACK  915sw
CONTROL  53se
COUNTERMEASURE  55s
EXPLOIT  1414s
EXPOSURE  44s
HACKER  910ne
OBJECT  123sw
RISK  1616e
SAFEGUARD  124e
SECURITYBLUEPRINT  1111se
SECURITYMODEL  33e
SECURITYPROFILE  33s
SUBJECT  124se
THREAT  99s
THREATAGENT  99s
VULNERABILITY  66s