TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

R B B N R S U R I V P G K E M I T C I V
P A S S W O R D H A S H I N G B X E F Y
F Y E W O L F R E V O R E F F U B T S P
K T S C U L F E G N I F O O P S X U Y A
D I T O I M L O R T N O C S S E C C A C
E R D M V V A D R R O A N J P R R E U K
N U R P T U R L Q O V C Y E I I A D T E
I C E U U L T E W J O M U R N M C O H T
A E N T N N I J S A C A R F G P K C E S
L S N E N E O X M N R Z Z O S E E S N N
O L A R E R L L U H I E B Z W R R U T I
F A C F L A P L R O R G Z N E S O O I F
S C S O M B X A F R T G O R E O V I C F
E I T R O I E W A S O I G L P N D C A I
R S R E D L R E T E P D U E E A S I T N
V Y O N E I A R T R Y I W R B T R L I G
I H P S N T W I A Z E V Q A T I O A O D
C P H I G Y Y F C D N W P W N O Y M N T
E X O C Y U P O K F O O A D K N I B E R
X G M S E S S I O N H I J A C K I N G R
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # # # # S U R I V # # # # M I T C I V
2P A S S W O R D H A S H I N G # # # # #
3# Y E W O L F R E V O R E F F U B # # P
4# T # C # # # # G N I F O O P S # # # A
5D I # O I M L O R T N O C S S E C C A C
6E R # M # V A # # R # # # # P R R E U K
7N U R P T U R L # O # # # # I I A D T E
8I C E U U L T E W J # M # # N M C O H T
9A E N T N N I # S A # # R # G P K C E S
10L S N E N E O # M N R # # O S E E S N N
11O L A R E R L L U H I E # # W R R U T I
12F A C F L A P L R O # G # # E S # O I F
13S C S O M B X A F R T # O # E O # I C F
14E I T R O I E W A S O # # L P N # C A I
15R S R E D L R E T E P # # E E A # I T N
16V Y O N E I A R T # Y # # R # T # L I G
17I H P S # T W I A # E # # A # I O A O #
18C P # I # Y Y F C # N # # W # O # M N #
19E # # C # # P # K # O # # D # N # # E #
20# # # S E S S I O N H I J A C K I N G R
Word X Y Direction
ACCESSCONTROL  195w
ADWARE  1420n
ATTACK  914s
AUTHENTICATION  195s
BUFFEROVERFLOW  163w
COMPUTERFORENSICS  44s
CRACKER  175s
DENIALOFSERVICE  15s
EXPLOIT  714n
FIREWALL  818n
HONEYPOT  1120n
MALICIOUSCODE  1818n
MALWARE  65se
PACKETSNIFFING  203s
PASSWORDHASHING  12e
PHYSICALSECURITY  218n
PINGSWEEP  156s
PORTSCANNER  317n
REMOTELOGINSERVICE  1111nw
SESSIONHIJACKING  420e
SMURFATTACK  99s
SPOOFING  164w
SPYWARE  720n
TROJANHORSE  105s
TUNNELMODE  57s
USERIMPERSONATION  163s
VICTIM  201w
VIRUS  101w
VULNERABILITY  66s
WORM  1511nw