TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

K Q N O I T A N O S R E P M I R E S U B
O D N S T R O J A N H O R S E W P X Q R
T E R C U N Z Y L C J O X Z O O J G E A
C L E I N P E R A W L A M L O E M M P B
J Y N S N L L A W E R I F F D E O A H P
X T N N E X P L O I T R I O K T S U Y A
L I A E L S O O R M E N C R E S M T S C
O L C R M C S O M V G S H L W P U H I K
R I S O O S W I O U U Q O O G Y R E C E
T B T F D X S R O O Y G R K R W F N A T
N A R R E Q E N I N I D D C E A A T L S
O R O E E F S C P N H Q X A K R T I S N
C E P T F D I Q S A T I K T C E T C E I
S N V U K L F E S Y B B J T A M A A C F
S L B P A S R H E R A W D A R Q C T U F
E U Z M Q V I C T I M I Z A C B K I R I
C V O O I N P E E W S G N I P K J O I N
C A L C G B V I R U S X B D P X I N T G
A C E E V Z B T O P Y E N O H P Z N Y V
A F E C I V R E S F O L A I N E D L G M
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # N O I T A N O S R E P M I R E S U #
2# # # S T R O J A N H O R S E W P # # R
3# # R C U # # # # # # # # # O O # # E #
4# # E I N # E R A W L A M L O E # M P #
5# Y N S N L L A W E R I F F D # O A H P
6# T N N E X P L O I T R I O # T S U Y A
7L I A E L S # # R # E N C # E S M T S C
8O L C R M # S # M V G S # L W P U H I K
9R I S O O # # I O # U # O O # Y R E C E
10T B T F D # # R O O # G R K R W F N A T
11N A R R E # E # I N I D # C E A A T L S
12O R O E # F # C # N H # # A K R T I S N
13C E P T F # I # S A # I # T C E T C E I
14S N # U # L # E S # # # J T A # A A C F
15S L B P A # R H E R A W D A R # C T U F
16E U # M # V I C T I M # # # C # K I R I
17C V # O I N P E E W S G N I P K # O I N
18C # # C G # V I R U S # # # # # I N T G
19A # E # # # # T O P Y E N O H # # N Y #
20# # E C I V R E S F O L A I N E D # G #
Word X Y Direction
ACCESSCONTROL  119n
ADWARE  1415w
ATTACK  1415n
AUTHENTICATION  185s
BUFFEROVERFLOW  414ne
COMPUTERFORENSICS  418n
CRACKER  1516n
DENIALOFSERVICE  1720w
EXPLOIT  56e
FIREWALL  135w
HONEYPOT  1519w
MALICIOUSCODE  416ne
MALWARE  134w
PACKETSNIFFING  205s
PASSWORDHASHING  194sw
PHYSICALSECURITY  194s
PINGSWEEP  1517w
PORTSCANNER  313n
REMOTELOGINSERVICE  1111sw
SESSIONHIJACKING  45se
SMURFATTACK  176s
SPOOFING  181sw
SPYWARE  167s
TROJANHORSE  52e
TUNNELMODE  52s
USERIMPERSONATION  191w
VICTIM  616e
VIRUS  718e
VULNERABILITY  217n
WORM  95s