TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

J U F N H E C I V R E S F O L A I N E D
P H Y S I C A L S E C U R I T Y V V S X
E B K P A C K E T S N I F F I N G X E P
I S C I S N E R O F R E T U P M O C J P
G N I K C A J I H N O I S S E S I V L I
L B O Y T I L I B A R E N L U V D H M N
O N O I T A N O S R E P M I R E S U I G
R R A T T S D P K L N A Q E C M T L T S
T E F R L A O W L D L P S V U Z Z O C W
N U K U S O C A A I O N F R E N P K I E
O D J C F B W I C R I C F S I Y M F V E
C Z R I A E F I T G E A T G E B L G Q P
S P N G R R O S O N T U N N E L M O D E
S G E I M U C L U T E E O M A L W A R E
E Z F D S A E B A P A H M S P Y W A R E
C N A C N T U C U X C R T T I O L P X E
C P O N O C K C K Y O B Y U P S U R I V
A D E M L P A S S W O R D H A S H I N G
E R E R C W E S R O H N A J O R T X E P
R R B U F F E R O V E R F L O W U P L Z
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # # # # E C I V R E S F O L A I N E D
2P H Y S I C A L S E C U R I T Y # # # #
3# # # P A C K E T S N I F F I N G # E #
4# S C I S N E R O F R E T U P M O C # P
5G N I K C A J I H N O I S S E S I # # I
6L # O Y T I L I B A R E N L U V # # M N
7O N O I T A N O S R E P M I R E S U I G
8R # # # T # D P # L # A # E # M # # T S
9T E # # # A O W L # L P S # U # # O C W
10N # K # # O C A A I O N # R # # P # I E
11O # # C F # W I C R I # F # # Y # # V E
12C # # I A E # I T G E A # # E # # # # P
13S # N # R R O S O N T U N N E L M O D E
14S G # I # U C L # T E # O M A L W A R E
15E # F # S A E # A # # H M S P Y W A R E
16C # # C N T # C # # # R T T I O L P X E
17C # O N O # K # # # O # # U # S U R I V
18A D E M # P A S S W O R D H A S H I N G
19E R E # # # E S R O H N A J O R T # # #
20# R B U F F E R O V E R F L O W # # # #
Word X Y Direction
ACCESSCONTROL  118n
ADWARE  67se
ATTACK  1212sw
AUTHENTICATION  1518nw
BUFFEROVERFLOW  420e
COMPUTERFORENSICS  184w
CRACKER  714nw
DENIALOFSERVICE  201w
EXPLOIT  2016w
FIREWALL  315ne
HONEYPOT  1215ne
MALICIOUSCODE  137sw
MALWARE  1414e
PACKETSNIFFING  43e
PASSWORDHASHING  618e
PHYSICALSECURITY  12e
PINGSWEEP  204s
PORTSCANNER  129sw
REMOTELOGINSERVICE  1111ne
SESSIONHIJACKING  165w
SMURFATTACK  177sw
SPOOFING  97sw
SPYWARE  1415e
TROJANHORSE  1719w
TUNNELMODE  1113e
USERIMPERSONATION  187w
VICTIM  1911n
VIRUS  2017w
VULNERABILITY  166w
WORM  1018ne