News Stay informed about the latest enterprise technology news and product updates.

Word search #3: iSeries security

Are you a secure enough iSeries user to take this word search challenge? Test your skills at our latest iSeries word search puzzle. Keep your eyes open, you never know who's looking over your shoulder or system!

Are you a secure enough iSeries user to take this word search challenge? Test your skills at our latest iSeries word search puzzle. These security terms have been hidden in the grid -- up, down, forward, backward, or diagonally. Within a word search puzzle, words can overlap; i.e., a letter can be part of two or more words. Keep your eyes open, you never know who's looking over your shoulder or system. Go ahead, hack away at this puzzle!

Need a little help? Visit Search400.com's Glossary of iSeries terms and acronyms.

WORD SEARCH SECURITY ANSWERS

C
E
T
B
E
S
A
F
E
S
P
N
R
O
O
D
K
C
A
B
U
S
B
B
Y
U
N
F
R
H
P
C
N
B
E
O
C
J
U
F
J
B
F
N
Y
N
A
U
W
C
L
I
P
W
B
A
A
F
I
A
B
N
W
U
B
W
N
E
R
U
T
P
A
C
B
G
F
S
U
A
C
R
F
L
C
P
G
E
Y
E
S
E
U
G
A
E
P
B
S
B
K
P
R
Y
N
R
E
U
S
C
I
S
K
S
Y
B
F
E
Y
O
M
F
N S
H
D
Y
U
S
A
B
R
U
L
T
T
S
N
T
E
E
A
N
Y
B
S
P
A
M
I
S
H
G
E
P
R
I
V
A
C
Y
J
O
H
W
I
N
A
R
P
W
C
L
R
E
C
N
S
R
E
K
C
A
H
W
U
K
S
E
G
O
E
F
N
X
C
S
N
U
L
O
S
E
C
U
R
I
T
Y
R
B
Y
I
N
P
Y
P
L
T
N
R
C
I
C
A
P
A
T
P
A
A
E
U
W
I
C
A
Y
F
F
B
S
F
S
N
G
H
T
C
B
F
E
P
A
E
A
W
F
N
S
R
R
U
E
W
P
N
X
C
L
H
O
N
I
W
I
I
U
B
P
S
C
A
N
A
A
S
S
C
N
I
P
C
T
S
S
G
B
F
I
O
S
O
C
E
C
X
T
T
K
H
Q
W
S
L
I
A
R
T
T
I
D
U
A
L
W
G
U
N
B
R
A
D
K
B
A
F
E
C
N
L
J
W
S
J
D
B
X
Y
G
G
S
C
N
I
T
A
G
M
T
S
E
A
N
Y
T
T
Q
O
E
X
P
L
O
I
T
N
O
Y
F
U
D
E
C
I
P
H
E
R
T
E
C
Y
M
O
N
O
I
S
S
I
M
R
E
P
W
F
M
A
S
P
I
P
U
E
P
Q
B
B
E
A
O
G
A
K
Y
P
N
Y
A
H
B
L
O
W
F
I
S
H
R
E
C
O
V
E
R
Y
S
E
N
A
T
T
A
C
K
B
I
E
T
O
A
N
O
I
B
Y
T
A
N
F
A
D
I
W
P
N
K
C
J
X
S
K
Y
C
N
A
U
A
W
Y
W
A
C
Y
S
O
P
W
S
E
G
N
E
U
E
C
I
W
N
O
I
T
A
Z
I
R
O
H
T
U
A
E
E
N
A
J
N
A
A
H
Y
A
Y
E
N
N
B
E
J
S
Y
S
T
E
M
I
N
T
E
G
R
I
T
Y
A
S
D
A
B
E
R
S
G
P
C
E
R
T
I
F
I
C
A
T
I
O
N
U
W
R
E
N
P
O
E
B
P
P
A
S
S
W
O
R
D
J
E
R
C
J
A
S
E
D
O
C
S
U
O
I
C
I
L
A
M
G
O
L
K
E
E
P
Y
O
U
R
E
Y
E
S
O
P
E
N
T
F
W
E
R
F
K
I
Y
E
W
O
R
X
O
X
W
B
O
U
N
Q
M
E
R
E
K
C
A
H
L
A
C
I
H
T
E
J
E
G
D
I
R
B
J
A
N
T
I
V
I
R
U
S
S
O
F
T
W
A
R
E
D
S
A

graph list sec ws

system integrity privacy cracker backup Bridge
malicious code phishing recovery attack permission
false acceptance protect decipher domain access
packet monkey munging decrypt spam bug
ethical hacker exploit password Capture audit trail
certification hackers back door authenticate Restrict
Chief Security Officer bucket brigade authorization access log
Bluetooth worm Blowfish antivirus software Security

Please note: This puzzle is NOT interactive...you cannot solve it on this page. Please print it out, and complete it the old fashion way -- with a pencil.

Did you enjoy this puzzle?

You may want to play other fun games from Search400.com.

Check out our iSeries word jumbles:

Jumble #1

Jumble #2

Jumble #3

And our iSeries word searches:

iSeries word search #1

Word search #2: iSeries commands

Dig Deeper on iSeries system and application security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

Close