TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

G E S V Y T I R U C E S L A C I S Y H P
N K U S E S S I O N H I J A C K I N G R
I T R C C P O R T S C A N N E R I T E Q
H M I I H T R O J A N H O R S E A M X R
S N V S P O O F I N G W I P Z C O T E W
A O U N I H V I C T I M T D W T J U W O
H I L E X P L O I T C P A I E O F N S L
D T N R P H Z O E W E O N L W F H N E F
R A E O E C I V R E S F O L A I N E D R
O C R F U M R O W P I G S M D W T L O E
W I A R Q G I S Y R I M R K W D O M C V
S T B E Y H G W E N U A E L A R P O S O
S N I T M N A W S R G L P R R E Y D U R
A E L U I R A E F C M W M N E K E E O E
P H I P E L R A J P H A I W I C N O I F
F T T M L V T M R G J R R W U A O B C F
L U Y O I T W W I E D E E W G R H P I U
Y A K C A L O R T N O C S S E C C A L B
K I E C A V I U I G X S U K C A T T A A
V B K N G N I F F I N S T E K C A P M V
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1G # S # Y T I R U C E S L A C I S Y H P
2N # U S E S S I O N H I J A C K I N G R
3I # R C # P O R T S C A N N E R # # E #
4H # I I # T R O J A N H O R S E # M # #
5S N V S P O O F I N G # I # # # O T # W
6A O U N # # V I C T I M T # # T # U # O
7H I L E X P L O I T # P A # E # # N # L
8D T N R # # # # # # E # N L # # # N E F
9R A E O E C I V R E S F O L A I N E D R
10O C R F # M R O W P I G S # D # T L O E
11W I A R # # # S Y R I M R # W # O M C V
12S T B E # # G W E N U A E # A R P O S O
13S N I T # N A W S R # L P # R E Y D U R
14A E L U I R A E F # # W M # E K E E O E
15P H I P E L R A # # # A I # # C N # I F
16# T T M L V T # # # # R R # # A O # C F
17# U Y O I T # # # # # E E # # R H # I U
18# A # C A L O R T N O C S S E C C A L B
19# # E C # # # # # # # # U K C A T T A #
20# # K # G N I F F I N S T E K C A P M #
Word X Y Direction
ACCESSCONTROL  1818w
ADWARE  159s
ATTACK  1919w
AUTHENTICATION  218n
BUFFEROVERFLOW  2017n
COMPUTERFORENSICS  418n
CRACKER  1618n
DENIALOFSERVICE  199w
EXPLOIT  47e
FIREWALL  129sw
HONEYPOT  1717n
MALICIOUSCODE  1920n
MALWARE  1211s
PACKETSNIFFING  1820w
PASSWORDHASHING  115n
PHYSICALSECURITY  201w
PINGSWEEP  415ne
PORTSCANNER  63e
REMOTELOGINSERVICE  1111sw
SESSIONHIJACKING  42e
SMURFATTACK  1310sw
SPOOFING  45e
SPYWARE  119sw
TROJANHORSE  64e
TUNNELMODE  185s
USERIMPERSONATION  1319n
VICTIM  76e
VIRUS  35n
VULNERABILITY  35s
WORM  910w