Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

N X M F U C B H A X D R A U G E F A S H
T V Z C Z T I L V C Y G U V P R D U A J
M A F V W A W F T A B L I P Y M B S T B
K F V A U X G D N T Q P U I K J W N C C
Z D A O M R J N E Q B I J E E Y I N A F
C J J A A B O D G F G M N C V R I S K Q
H Y L Y S C H U A A D V T R P M I H L C
C F E T B X U L T O B X E E T R L Z B E
B J D X A W W G A G P K U F G P O C A R
K Z O B J E C T E J C L D Q G O R V W W
Y V M G V S R O R A B O R M E K T E I X
Z H Y T T C S H H Y T X M E C E N E T M
B I T I P O Q E T Q E V C A S A O T U P
X D I O T J E I C X S T T A Q K C T U Q
U E R L E K R W K C S T T N O S P V Z P
P V U P V U L N E R A B I L I T Y Q U G
H P C X C O U N T E R M E A S U R E Q H
G X E E X P O S U R E V O M N V B I H V
D P S E C U R I T Y P R O F I L E E P M
P A T C J Q H U A T V I K V P J Y S D K
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # # # # # # # # D R A U G E F A S #
2# # # # # # # # # # # # # # # # # U # #
3# # # # # # # # T # # # # # # # B # T #
4# # # # # # # # N # # # # # # J # N # #
5# # # # # # # # E # # # # # E # I # # #
6# # # # # # # # G # # # # C # R I S K #
7# # L # # # # # A # # # T R P # # # # #
8# # E T # # # # T # # # E E # # L # # #
9# # D # A # # # A # # K U # # # O # # #
10# # O B J E C T E # C L # # # # R # # #
11# # M # # S R # R A B # # # # K T # # #
12# # Y T # # S H H Y T # # # C # N # # #
13# # T I # # # E T # E # # A # # O # # #
14# # I O # # # I C # S # T # # # C # # #
15# # R L # # R # # C S T # # # # # # # #
16# # U P V U L N E R A B I L I T Y # # #
17# # C X C O U N T E R M E A S U R E # #
18# # E E X P O S U R E # # # # # # # # #
19# # S E C U R I T Y P R O F I L E # # #
20# # # # # # # # # # # # # # # # # # # #
Word X Y Direction
ACCESS  1116nw
ASSET  1116n
ATTACK  1116ne
CONTROL  1714n
COUNTERMEASURE  517e
EXPLOIT  418n
EXPOSURE  418e
HACKER  912ne
OBJECT  310e
RISK  166e
SAFEGUARD  191w
SECURITYBLUEPRINT  1111ne
SECURITYMODEL  319n
SECURITYPROFILE  319e
SUBJECT  191sw
THREAT  913nw
THREATAGENT  913n
VULNERABILITY  616e