TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

A J U S E R I M P E R S O N A T I O N S
M R G N L I A C C E S S C O N T R O L W
W V Y N O E D O C S U O I C I L A M E K
D N T N I H E S U R I V O J P E G C W E
E B I O I K T R T C L I D L R N I O X D
N G R I Q V C R A C K E R A I V M M O O
I N U T E I B A H W T E W H R O E P B M
A I C A A C O A J O D Y S E A V C U P L
L F E C G T M K P I P A S D U K F T O E
O F S I N I N Y R S H N Q L Y F T E R N
F I L T I M E I B D I N N C E P I R T N
S N A N F N Z Y R G F E O R K I O F S U
E S C E O O T O O I R M O I W N L O C T
R T I H O S W L R A N V U S S G P R A W
V E S T P S E E B T E H T Y R S X E N J
I K Y U S T W I N R B G M R O W E N N H
C C H A O A L J F K A Q V H J E V S E K
E A P M L I H L E R A W L A M E L I R W
E P E L T R O J A N H O R S E P D C R K
D R B Y R W X K C A T T A F R U M S Z G
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # U S E R I M P E R S O N A T I O N #
2# # G # # # A C C E S S C O N T R O L #
3# # Y N # E D O C S U O I C I L A M E #
4D # T N I # E S U R I V # # # E G C # E
5E # I O # K # R # # # # # # R N I O # D
6N G R I # V C R A C K E R A I V # M # O
7I N U T # I # A # W T # W H R # # P B M
8A I C A # C # # J O D Y S E # V # U P L
9L F E C G T # # P I P A S # U # F T O E
10O F S I N I # Y # S H N # L # F T E R N
11F I L T I M E # # D I N N # E P I R T N
12S N A N F N # # R G F E O R # I O F S U
13E S C E O # # O O I R # O I # N L O C T
14R T I H O # W L R A # V # # S G P R A #
15V E S T P S E E B # E # # # # S X E N #
16I K Y U S T W I # R # # M R O W E N N #
17C C H A O A L # F # # # # # # E # S E #
18E A P M L I # L E R A W L A M E # I R #
19# P E L T R O J A N H O R S E P # C # #
20# R # Y # W # K C A T T A F R U M S # #
Word X Y Direction
ACCESSCONTROL  72e
ADWARE  129nw
ATTACK  1320w
AUTHENTICATION  417n
BUFFEROVERFLOW  188sw
COMPUTERFORENSICS  184s
CRACKER  76e
DENIALOFSERVICE  14s
EXPLOIT  1716n
FIREWALL  1112sw
HONEYPOT  414ne
MALICIOUSCODE  183w
MALWARE  1518w
PACKETSNIFFING  219n
PASSWORDHASHING  318ne
PHYSICALSECURITY  318n
PINGSWEEP  1611s
PORTSCANNER  198s
REMOTELOGINSERVICE  1111ne
SESSIONHIJACKING  1817nw
SMURFATTACK  1820w
SPOOFING  516n
SPYWARE  1010ne
TROJANHORSE  519e
TUNNELMODE  2013n
USERIMPERSONATION  31e
VICTIM  66s
VIRUS  124w
VULNERABILITY  168sw
WORM  1616w