TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

V L P A S S W O R D H A S H I N G Y U O
R O S F I R E W A L L R Z G V Q V Y J E
Y R E N W J B J K D O J X V V K Q W W Z
P T Y C O M P U T E R F O R E N S I C S
O N I N I I A A F R X N P I O T P X R M
R O W L O V T L C F O P S V M L O M A U
T C H P I I R A I K E J L Z S Y O E C R
S S O W I B T E N C E R A O P K F R K F
C S N U H N A A S O I T O N I X I A E A
A E E A O H G R C N S O S V H T N W R T
N C Y R H A M S E I I R U N E O G Y S T
N C P L A M R O W N T G E S I R R P J A
E A O X Q W E M N E L N O P C F F S U C
R R T S V H L Y H K E U E L M O F L E K
M J A U U J I A B H F P V H E I D I O Q
L B O W H E D O M L E N N U T T R E N W
Q V B T D M I T C I V I R U S U O E M G
G N I K C A J I H N O I S S E S A M S M
G U M Z D E N I A L O F S E R V I C E U
P H Y S I C A L S E C U R I T Y K I Z R
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# L P A S S W O R D H A S H I N G # # #
2# O # F I R E W A L L # # # # # # # # #
3Y R E N # # B # # # # # # # # # # # # #
4P T # C O M P U T E R F O R E N S I C S
5O N I N I I A A F R X # # # # # P # R M
6R O # L O V T L C F O P # # # # O # A U
7T C H P I I R A I K E J L # # # O E C R
8S S O # I B T E N C E R A O # # F R K F
9C S N # # N A A S O I T O N I # I A E A
10A E E # # # G R C N S O S V H T N W R T
11N C Y R # # # S E I I R U N E O G Y # T
12N C P # A M R O W N T G E S I R R P # A
13E A O # # W # # # E L N O P C F F S # C
14R R T # # # L # # # E U E L M O F L E K
15# # A # # # # A # # # P V H E I D I O #
16# # # W # E D O M L E N N U T T R E N W
17# # # # D M I T C I V I R U S U O E # G
18G N I K C A J I H N O I S S E S A M S #
19# # # # D E N I A L O F S E R V I C E U
20P H Y S I C A L S E C U R I T Y # # # R
Word X Y Direction
ACCESSCONTROL  213n
ADWARE  618nw
ATTACK  209s
AUTHENTICATION  1718nw
BUFFEROVERFLOW  84se
COMPUTERFORENSICS  44e
CRACKER  194s
DENIALOFSERVICE  519e
EXPLOIT  104se
FIREWALL  42e
HONEYPOT  37s
MALICIOUSCODE  64se
MALWARE  916nw
PACKETSNIFFING  74se
PASSWORDHASHING  31e
PHYSICALSECURITY  120e
PINGSWEEP  47se
PORTSCANNER  14s
REMOTELOGINSERVICE  1111nw
SESSIONHIJACKING  1618w
SMURFATTACK  204s
SPOOFING  174s
SPYWARE  1813n
TROJANHORSE  94se
TUNNELMODE  1516w
USERIMPERSONATION  2019nw
VICTIM  1117w
VIRUS  1117e
VULNERABILITY  1315nw
WORM  912w