TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

Y Y T T I O L P X E Y K R I G R K Z N L
F C G N I F F I N S T E K C A P Z O Y E
R W A N D H Q U P V N Y L H A Q I T E N
N B D M I R F O M N L O R S I T N C A Y
N O R E O K O K A A R L S P A X I O G T
X D I E N F C C P T L W W N V V P M F I
W Y X T I I S A N I O W O U R T A P B R
S X T N A T A O J R N S A E K L C U F U
N M G I R C C L D I R G S R I N F T R C
T Q U O L S I H O E H N S C E F G E E E
L O P R S I A T P F I N I W E K S R K S
E E P E F S B M N G S O O R E R B F C L
Z R C Y H A I A O E U E O I O E I O A A
V C A I E R T L R S H V R H S R P R R C
A I N W E N E T C E E T N V E S T E C I
D G C S Y T O O A R N A U W I N E N V S
W L U T O P D H F C J L A A H C K S I Y
A J H M I E S L K O K L U F B M E I R H
R Q E I Y M O K R P L E X V K U E C U P
E R M R O W Y T U N N E L M O D E S S O
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # # T I O L P X E # # R # # # # # N #
2# # G N I F F I N S T E K C A P # O # #
3# # # N # # # # P # N # L # A # I # E #
4N # D # I # # O M N # O # S # T # C # Y
5# O # E # K O # A A R # S # A # I O # T
6# # I # N F C C P T L W # N # V # M # I
7# Y # T I I S A N I O W O # R # A P B R
8S # T N A T A O J R N S A E # L # U # U
9# M G I R C C L D I R G S R I # F T R C
10T # U O L S I H O E H N S C E F # E E E
11# O P R S I A T P F I N I W E # S R K S
12E # P E F S B M N G S O O R E R # F C L
13# R C Y H A I A O E U E O I O E I O A A
14V C A I E R T L R S H V R H S R P R R C
15A I N W E N E T C E E T N V E S # E C I
16D G C S Y T O O A R N A U W I # E N V S
17W # U T O P D H F C J L A A # C # S I Y
18A # # M I E S L # O K L U # # # E I R H
19R # E # # M O # R # L # # V # # # C U P
20E R M R O W # T U N N E L M O D E S S #
Word X Y Direction
ACCESSCONTROL  115ne
ADWARE  115s
ATTACK  613se
AUTHENTICATION  1417nw
BUFFEROVERFLOW  188sw
COMPUTERFORENSICS  184s
CRACKER  1915n
DENIALOFSERVICE  34se
EXPLOIT  101w
FIREWALL  1812sw
HONEYPOT  817nw
MALICIOUSCODE  186sw
MALWARE  94se
PACKETSNIFFING  162w
PASSWORDHASHING  162sw
PHYSICALSECURITY  2019n
PINGSWEEP  96se
PORTSCANNER  311ne
REMOTELOGINSERVICE  1111ne
SESSIONHIJACKING  1817nw
SMURFATTACK  18se
SPOOFING  102sw
SPYWARE  718nw
TROJANHORSE  820ne
TUNNELMODE  820e
USERIMPERSONATION  317ne
VICTIM  114se
VIRUS  1916s
VULNERABILITY  1419nw
WORM  620w