TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

C G E S Z B P A C K E T S N I F F I N G
Y V G S A B U R D P O R T S C A N N E R
Q Y G N A C A F S W U R P Z U U Q M E Y
N I E D I C C U F T A O P T Q F I C G Y
R O U C K K R E E E O R H O Q T I O N T
P I I E I I C R S F R E E V C V X M I I
Z E R T V V A A I S N O U I R T A P H R
H E E G A W R N J T C L V E M L V U S U
I R D W L N G E I I N O S E I Y D T A C
K A O A S Y O C S E H N N C R K L E H E
T W M U U G A S R F I N I T T F X R D S
G Y L Q L T N A R G O O O O R P L F R L
O P E G I L B I O E U L P I L O L O O A
R S N O F I A L P S P Y A O S K L R W C
Y M N J L Y E W C G E M I I C S C E S I
V I U I H T O O E N G T I A N U E N S S
P X T R O R D T O R T R T R A E X S A Y
B Y Q M M E A H A M I T P C E Z D I P H
D Q E F N K C A T T A F R U M S T C C P
W R M H T R O J A N H O R S E H U S L M
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # # # # B P A C K E T S N I F F I N G
2# # G # A # U R D P O R T S C A N N E R
3# # # N # C A F S W # # P # U # # M E #
4N # E # I C C U F # A O # T # # I C G Y
5# O # C K K R E E E O R H # # T I O N T
6P # I E I I C R S F R E E V C V # M I I
7# E R T V V A A I S N O U I R # A P H R
8# E E # A W R N J T C L V E # L # U S U
9# R D W L N G E I I N O S E I # # T A C
10# A O A S # O C S E H N N C R # # E H E
11# W M # # G A S R F I N I T T F X R D S
12# Y L # L T N A R G O O O O R P L F R L
13# P E # I L B I O E U L P I L O # O O A
14# S N O # I A L P S P Y A O S K L R W C
15# # N # L # E W C # E M I I C S # E S I
16# # U I # T O O E N # T I A N # E N S S
17# # T # O R D # O R # # T R # E # S A Y
18# Y # M M E # H # # I T # # E # D I P H
19# # E # # K C A T T A F R U M S # C # P
20# R # # T R O J A N H O R S E # U S # #
Word X Y Direction
ACCESSCONTROL  52se
ADWARE  81se
ATTACK  1119ne
AUTHENTICATION  162sw
BUFFEROVERFLOW  72se
COMPUTERFORENSICS  184s
CRACKER  91sw
DENIALOFSERVICE  1718nw
EXPLOIT  1810sw
FIREWALL  1219nw
HONEYPOT  818ne
MALICIOUSCODE  186sw
MALWARE  311ne
PACKETSNIFFING  71e
PASSWORDHASHING  1918n
PHYSICALSECURITY  2019n
PINGSWEEP  914nw
PORTSCANNER  102e
REMOTELOGINSERVICE  1111ne
SESSIONHIJACKING  1817nw
SMURFATTACK  1619w
SPOOFING  142sw
SPYWARE  214n
TROJANHORSE  520e
TUNNELMODE  317n
USERIMPERSONATION  1720nw
VICTIM  138ne
VIRUS  57ne
VULNERABILITY  146sw
WORM  815sw