TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

P E E W S G N I P B M X K V N F K A U M
P T O P Y E N O H V I S Q R O A D E C A
G R E I S M P U Y N T P M T I C R C W S
M W T C N Q V Y S P C O A R T C E I Z V
P O U O I W E D I Q I O L O A E X V E P
O L N M G V B R C U V F I J N S P R Y A
R F N P I R R Q A D U I C A O S L E T C
T R E U D E H E L W Q N I N S C O S I K
S E L T V K T X S U Y G O H R O I F L E
C V M E L C S L E N M P U O E N T O I T
A O O R E A Q L C A I N S R P T C L B S
N R D F R R T A U D B G C S M R J A A N
N E E O A C Y W R W K T O E I O G I R I
E F R R W E M E I A K M D L R L M N E F
R F J E L C A R T R R G E R E N W E N F
D U U N A Y V I Y E V I R U S T P D L I
T B Y S M U R F A T T A C K U H O U U N
L G N I H S A H D R O W S S A P H M V G
U M F C N O I T A C I T N E H T U A E T
W K E S E S S I O N H I J A C K I N G R
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1P E E W S G N I P # M # # # N # # # # #
2# T O P Y E N O H # I S # # O A # E # #
3# R E # # # # # Y # T P M T I C # C # #
4M W T C # # # # S # C O A R T C E I # #
5P O U O I # E # I # I O L O A E X V # P
6O L N M # V # R C # V F I J N S P R Y A
7R F N P # R R # A # # I C A O S L E T C
8T R E U # E # E L W # N I N S C O S I K
9S E L T # K # # S # Y G O H R O I F L E
10C V M E # C # L E N # P U O E N T O I T
11A O O R E A # L C A I # S R P T # L B S
12N R D F R R # A U D # G C S M R # A A N
13N E E O A C # W R W # # O E I O # I R I
14E F # R W # # E I A # # D L R L # N E F
15R F # E L # # R T R # # E # E # # E N F
16# U # N A # # I Y E V I R U S T # D L I
17# B # S M U R F A T T A C K U # O # U N
18# G N I H S A H D R O W S S A P # M V G
19# # # C N O I T A C I T N E H T U A E #
20# # # S E S S I O N H I J A C K I N G R
Word X Y Direction
ACCESSCONTROL  162s
ADWARE  1011s
ATTACK  917e
AUTHENTICATION  1819w
BUFFEROVERFLOW  216n
COMPUTERFORENSICS  44s
CRACKER  613n
DENIALOFSERVICE  1816n
EXPLOIT  174s
FIREWALL  817n
HONEYPOT  92w
MALICIOUSCODE  133s
MALWARE  517n
PACKETSNIFFING  205s
PASSWORDHASHING  1618w
PHYSICALSECURITY  91s
PINGSWEEP  91w
PORTSCANNER  15s
REMOTELOGINSERVICE  1111nw
SESSIONHIJACKING  420e
SMURFATTACK  417e
SPOOFING  122s
SPYWARE  1311nw
TROJANHORSE  143s
TUNNELMODE  34s
USERIMPERSONATION  1517n
VICTIM  116n
VIRUS  1116e
VULNERABILITY  1918n
WORM  41sw