TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

W U F F S Z F E R A W L A M J W F G E Q
T S Q S M U R F A T T A C K G W N C Y R
R E Y C P E E W S G N I P D O I I T E E
O R Y I W Q K X K N P O Q L H V I M F B
J I R S C L L A W E R I F S R L O T R P
A M G N E R U T M T H R A E I T O E A H
N P B E T S F T S M E H S B E P D C N Y
H E Q R M N S C D V D F A L Y O K O P S
O R L O Y R A I O R O R O E C E I T P I
R S B F Y N O R O L E G N S T T L O E C
S O R R N P E W A N I O U S A S O R R A
E N H E C F S I L N H O N C C F A A V L
X A R T F S N U S E I I I H I W C E Q S
P T M U A E V E R C F T J N D K C E S E
L I B P D P R A I F N P G A E U Z Z U C
O O X M E V W L I E J Z U R C C U A R U
I N M O I Y A N H M Z N Q N N K U A I R
T T V C P M G T V I C T I M V N I E V I
F O E S Z G U W S Z E D O M L E N N U T
K C A T T A C C E S S C O N T R O L G Y
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# U # # # # # E R A W L A M # # # G E #
2T S # S M U R F A T T A C K # W N C Y R
3R E # C P E E W S G N I P # O I I T E #
4O R # I # # # # # # # O # L H V I M # #
5J I # S # L L A W E R I F S R L O T # P
6A M # N E # # # # T # R A E I T O E A H
7N P # E # S # # S # E H S B E P D C N Y
8H E # R M # S C # V D F A L Y O K O # S
9O R # O # R A I O R O R O E C E I # P I
10R S # F # N O R O L E G N S T T # O E C
11S O # R N # E W A N I O U S A # O R R A
12E N # E # F S I L N H O N C # F A A # L
13X A R T F S N U S E I I I # I W C # # S
14P T # U A E V E R C F T J N D K # # S E
15L I B P D # R A I F N # G A E # # # U C
16O O # M # V W L I E # # # R C # # # R U
17I N # O I Y A N H # # # # # # K # # I R
18T # # C P M G T V I C T I M # # I # V I
19# # E S # # U # # # E D O M L E N N U T
20K C A T T A C C E S S C O N T R O L G Y
Word X Y Direction
ACCESSCONTROL  620e
ADWARE  1415ne
ATTACK  620w
AUTHENTICATION  620ne
BUFFEROVERFLOW  414ne
COMPUTERFORENSICS  418n
CRACKER  2010sw
DENIALOFSERVICE  515ne
EXPLOIT  112s
FIREWALL  135w
HONEYPOT  1112ne
MALICIOUSCODE  618ne
MALWARE  141w
PACKETSNIFFING  205sw
PASSWORDHASHING  415ne
PHYSICALSECURITY  205s
PINGSWEEP  133w
PORTSCANNER  133sw
REMOTELOGINSERVICE  1111sw
SESSIONHIJACKING  45se
SMURFATTACK  42e
SPOOFING  208sw
SPYWARE  419ne
TROJANHORSE  12s
TUNNELMODE  2019w
USERIMPERSONATION  21s
VICTIM  918e
VIRUS  1918n
VULNERABILITY  714ne
WORM  811nw