Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

I X M O R C O N T R O L Z U X L F T O M
I R Z L L W A G F G J K H K D X E E X B
L V S E C U R I T Y M O D E L S Z K S N
N S E E X P L O I T H F U A S P A M V X
P U C X C O U N T E R M E A S U R E R M
H B U P V U L N E R A B I L I T Y Y L U
B D R O W N R K F C D I L N C X A K L L
F K I S O G U I C L F Z R D S Q I I M K
N D T U B S H E T H R E A T A G E N T D
N S Y R X D S P A Y A Y D T Z P T O G X
S O P E E S Z C D T B E A V T Z E C M R
H T R G X L K D O D B L F T I A I N C P
T A O R P E N H D N Y A U N I K C J L G
B R F B R C Q J D H T I G E D Z M K Y T
H B I Q J A E U J N Q O N Q P X G F O C
Y U L Q Q E H F O F Q X L O I R W S N E
F S E Y S S C E Q S D A Z U I N I L G J
G T D Z N M P T B W K U X S T U W N K B
M E G D H M W U K D F B K Y T I K W T U
F O S E Y Y J G S M V D R A U G E F A S
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # # # C O N T R O L # # # # # T # #
2# # # # # # # # # # # # # # # # E # # #
3# # S E C U R I T Y M O D E L S # # # #
4# # E E X P L O I T # # # # S # # # # #
5# # C X C O U N T E R M E A S U R E # #
6# # U P V U L N E R A B I L I T Y # # #
7# # R O # # R # # C # # # # # # # # # #
8# # I S # # # I C # # # # # # # # # # #
9# # T U # # # E T H R E A T A G E N T #
10# # Y R # # S # A Y # # # T # # # # # #
11# # P E # S # C # # B # # # T # # # # #
12# # R # # # K # # # # L # # # A # # # #
13# # O # # E # # # # # # U # # # C # # #
14# # F B R # # # # # # # # E # # # K # T
15# # I # J # # # # # # # # # P # # # # C
16# # L # # E # # # # # # # # # R # # # E
17# # E # # # C # # # # # # # I # I # # J
18# # # # # # # T # # # # # S # # # N # B
19# # # # # # # # # # # # K # # # # # T U
20# # # # # # # # # # # D R A U G E F A S
Word X Y Direction
ACCESS  116sw
ASSET  145ne
ATTACK  139se
CONTROL  61e
COUNTERMEASURE  55e
EXPLOIT  44e
EXPOSURE  44s
HACKER  109sw
OBJECT  313se
RISK  1616sw
SAFEGUARD  2020w
SECURITYBLUEPRINT  1111se
SECURITYMODEL  33e
SECURITYPROFILE  33s
SUBJECT  2020n
THREAT  99e
THREATAGENT  99e
VULNERABILITY  66e