TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

Y E Y T I R U C E S L A C I S Y H P Y J
Z R G N I K C A J I H N O I S S E S A A
B S E X P L O I T O E E V P M T R C G C
H N M M V E H P N T H M O E U Y E I P C
F W O B O W D E R S A O T N R T N S A E
M X Z I I T Y O P E F C N Q F I N N C S
I H K P T P E Y C I K E K I A L A E K S
T X N B O A W L N S L C R U T I C R E C
C F A T D A C G O M U E A S T B S O T O
I R R W R S A I O G W O U R A A T F S N
V R A E N B B D T A I R I F C R R R N T
H R M D J W E F L N I N L C K E O E I R
E M P S A V B L X V E A S B I N P T F O
E R A W L A M T Q D T H X E Q L V U F L
Z O E S R O H N A J O R T Y R U A P I R
B W O L F R E V O R E F F U B V V M N N
V G N I H S A H D R O W S S A P I O G U
M E E C I V R E S F O L A I N E D C Z Q
Q Y H P E E W S G N I P F D Z I U T E A
N O I T A N O S R E P M I R E S U J A C
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # Y T I R U C E S L A C I S Y H P # #
2# R G N I K C A J I H N O I S S E S # A
3# # E X P L O I T O # # # P M T R C # C
4# N # M # E # # N T # # O # U Y E I P C
5# # O # O # D E R S A O # N R T N S A E
6M # # I # T Y O P E F C N # F I N N C S
7I # # # T P E Y C I K E K I A L A E K S
8T # # # O A W L N S L C R # T I C R E C
9C # # T D A C G O M U E A S T B S O T O
10I # # W R # # I O G W O U R A A T F S N
11V # A E # # # D T A I R I # C R R R N T
12# R # # # # E # L N I N # C K E O E I R
13E M # # # # # L # V E # S # I N P T F O
14E R A W L A M # # # # H # E # L # U F L
15# O E S R O H N A J O R T # R U A P I #
16# W O L F R E V O R E F F U B V # M N #
17# G N I H S A H D R O W S S A P I O G #
18# # E C I V R E S F O L A I N E D C # #
19# # # P E E W S G N I P # # # # # # E #
20N O I T A N O S R E P M I R E S U # # #
Word X Y Direction
ACCESSCONTROL  202s
ADWARE  68sw
ATTACK  82se
AUTHENTICATION  1517nw
BUFFEROVERFLOW  1416w
COMPUTERFORENSICS  1818n
CRACKER  1511nw
DENIALOFSERVICE  1718w
EXPLOIT  33e
FIREWALL  156sw
HONEYPOT  112sw
MALICIOUSCODE  1816nw
MALWARE  714w
PACKETSNIFFING  194s
PASSWORDHASHING  1617w
PHYSICALSECURITY  181w
PINGSWEEP  1219w
PORTSCANNER  1713n
REMOTELOGINSERVICE  1111se
SESSIONHIJACKING  182w
SMURFATTACK  152s
SPOOFING  152sw
SPYWARE  105sw
TROJANHORSE  1315w
TUNNELMODE  163sw
USERIMPERSONATION  1720w
VICTIM  111n
VIRUS  1013ne
VULNERABILITY  1616n
WORM  216n