Introduction to InfoSec

ACCESS
ASSET
ATTACK
CONTROL
COUNTERMEASURE
EXPLOIT
EXPOSURE
HACKER
OBJECT
RISK
SAFEGUARD
SECURITYBLUEPRINT
SECURITYMODEL
SECURITYPROFILE
SUBJECT
THREAT
THREATAGENT
VULNERABILITY

Key terms in information security.

Try to find all 18 words on this board.

I K R T E R N Y B I Q Q E S O Y N F H P
Y T D Y E Z B Q I T K N L K W D J Y Q O
B C R P H S L E D O M Y T I R U C E S P
K K O U E Q S T O E C T I O L P X E E T
M H C E R U S A E M R E T N U O C X C P
Q G M A Y T I L I B A R E N L U V P U C
S S U N T H A D Y T X W F A R K B O R X
J H Q T F T B W M M Y D I I I L A S I B
O E T N E G A T A E R H T S S Y K U T H
P A Y P E V N C O Z A Y A U K S D R Y J
X P D D R Y C F K C B F Z B J N I E P R
N S B N Z E E P K L E W H J Z T H F R N
S H A Y S E Q E U G F I O E W Q S E O I
N Z G S F I R E U O W X Q C D Y W B F W
B U C W F J P A O L L T O T N K J P I V
Q P J R O R R P H H L A D J G E L T L N
L U P R I D I Q C Q F N X Z C L X D E Q
E B J N J K L W V N N Q O T D J G G V I
G N T A F W A I T L O R T N O C T H Y I
J P Q K X E M F B Q R O B G T C H J O C
Brought to you by WordSearchFun.com



Answer Key for Introduction to InfoSec

X
Y
1234567891011121314151617181920
1# # # T # # # # # # # # # # # # # # # #
2# # # # E # # # # # # # # # # # # # # #
3# # # # # S L E D O M Y T I R U C E S #
4# K # # # # S # # # # T I O L P X E E #
5# # C E R U S A E M R E T N U O C X C #
6# # # A Y T I L I B A R E N L U V P U #
7# # # # T # # # # # # # # # R # # O R #
8# # # # # T # # # # # # # I I # # S I #
9# # T N E G A T A E R H T S S # # U T #
10# # # # # # # C # # A Y A U K # # R Y #
11# # # # # # C # # C B F # B # # # E P #
12# # # # # E # # K L E # # J # # # # R #
13# # # # S # # E U G # # # E # # # # O #
14# # # S # # R E U # # # # C # # # B F #
15# # # # # # P A # # # # # T # # J # I #
16# # # # # R R # # # # # # # # E # # L #
17# # # # I D # # # # # # # # C # # # E #
18# # # N # # # # # # # # # T # # # # # #
19# # T # # # # # # L O R T N O C # # # #
20# # # # # # # # # # # # # # # # # # # #
Word X Y Direction
ACCESS  99sw
ASSET  85nw
ATTACK  79nw
CONTROL  1619w
COUNTERMEASURE  175w
EXPLOIT  184w
EXPOSURE  184s
HACKER  129sw
OBJECT  1913sw
RISK  157s
SAFEGUARD  149sw
SECURITYBLUEPRINT  1111sw
SECURITYMODEL  193w
SECURITYPROFILE  193s
SUBJECT  149s
THREAT  139w
THREATAGENT  139w
VULNERABILITY  166w