TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

O E C I V R E S F O L A I N E D V G V G
U D Y S G W S X M X A L G R F L N I W R
C K T C P G O D P U E A Y F Z I R A E F
N W I I R O E L P L R I A Z H U P M E Y
O P R S R A O L F Z O F Q S S O O R S T
I A U N E T C F K R E I A Z R T A P R I
T C C E V S Q K I I E H T T E K Y G O L
A K E R M L S P E N D V S L T W G M H I
N E S O P R O I V R G C O J A A N D N B
O T L F R E O R O Z A G G R I O C P A A
S S A R Z W E W T N I F E A E F S K J R
R N C E X I S W N N H D F E V F S D O E
E I I T G S M E S O O I Y E R I F A R N
P F S U A H R E N G R C J H R A C U T L
M F Y P V H R E B E N P S A O A W T B U
I I H M H V Y Q W R C I A S C J W L I V
R N P O I P P A V V D O P O E K N D A M
E G D C O U L E D O C S U O I C I L A M
S I E T U L E D O M L E N N U T C N P K
U W A U T H E N T I C A T I O N X A G B
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# E C I V R E S F O L A I N E D # G V #
2# # Y S # W # X M # # # # # # # N I # R
3# # T C P # O # P U # # # # # I R # E #
4N # I I R O # L # L R # # # H U P M E Y
5O P R S # A O # F # O F # S S O O # S T
6I A U N E # C F # R # I A # R T # P R I
7T C C E # S # K I # E H T T E # Y # O L
8A K E R M L S # E N D V S L T W # # H I
9N E S O P R O I # R G C O # A A # # N B
10O T L F # E O R O # A G # R # # C # A A
11S S A R # # E W T N I # E # E # # K J R
12R N C E # # S W N N H # F E V F # # O E
13E I I T # S # E S O O I # E R I F # R N
14P F S U A # R E N G R C J # R A C U T L
15M F Y P # # R E # E N # S A # A W T B U
16I I H M # V Y # W # # I # S C # W L I V
17R N P O I P # A # # # # P # E K # D A M
18E G # C O # L E D O C S U O I C I L A M
19S # E T # L E D O M L E N N U T C N # #
20U # A U T H E N T I C A T I O N # A G #
Word X Y Direction
ACCESSCONTROL  1820nw
ADWARE  1918nw
ATTACK  136se
AUTHENTICATION  320e
BUFFEROVERFLOW  1814nw
COMPUTERFORENSICS  418n
CRACKER  43se
DENIALOFSERVICE  161w
EXPLOIT  71se
FIREWALL  1312sw
HONEYPOT  1112sw
MALICIOUSCODE  2018w
MALWARE  2018nw
PACKETSNIFFING  25s
PASSWORDHASHING  415ne
PHYSICALSECURITY  317n
PINGSWEEP  1317nw
PORTSCANNER  174sw
REMOTELOGINSERVICE  1111sw
SESSIONHIJACKING  45se
SMURFATTACK  81se
SPOOFING  42se
SPYWARE  195sw
TROJANHORSE  1914n
TUNNELMODE  1619w
USERIMPERSONATION  120n
VICTIM  1512se
VIRUS  191sw
VULNERABILITY  2016n
WORM  811nw