TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

S B N O I T A N O S R E P M I R E S U V
P R E C I V R E S F O L A I N E D S I Y
O N E G N I F O O P S M B W A P M C G O
R O E M X E Z I B Z J P O E H R R I N K
T I O N O P D Q R D I L Y Y O A N S I M
S T S P U T S O T E F T S W C L E N H K
C A R A A G E O C R W I I K A S I E S C
A C E O V C P L E S C A E O S R Y R A A
N I Z J J Y K V O A U R L I L T E O H T
N T G O E A O E L G X O O L I P U F D T
E N U N J R N S T X I N I L H P X R R A
R E O N E M E H P S H N I C S K T E O F
O H M F N C G E O I N B S F I R Q T W R
F T F I U E E V J R A I E E E L R U S U
L U M R T W L A I R S R F R R S A P S M
B A I Q S C C M E R A E A F D V F M A S
A T U G S K I N O W U W U H I M I O P Y
Y N N T I B L V L D D S A R K N I C P F
R I M N Z U Q A Q A E F Q L V S G X E F
P N G I V K M L O R T N O C S S E C C A
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # N O I T A N O S R E P M I R E S U #
2P R E C I V R E S F O L A I N E D S # #
3O N E G N I F O O P S # # W # P M C G #
4R O # M # E # I # # # P O # H R R I N #
5T I # # O # D # R # # L Y Y O A # S I #
6S T # P # T # O T E F T S W C # E N H K
7C A R # A # E O C R W I I K A S # E S C
8A C # O # C P L E S C A E O S R Y R A A
9N I # # J Y K V O A U R L I L T E O H T
10N T # # E A O E L G # O O L I P # F D T
11E N U N # R N S T # I N I L # # X R R A
12R E O N E # E H P S H N I C # # # E O F
13# H M F N C # E O I N B S # I # # T W R
14# T F I U E E V J R A I E E E L # U S U
15# U # R T W L A I R S R F R R # A P S M
16B A I # S C C M E R A E A F # V # M A S
17# T # G # K I N O W U W # # I # I O P #
18Y # N # I # L V L D D S # # # N # C # #
19# I # N # U # A # A E # # # # # G # E #
20P # G # V # M L O R T N O C S S E C C A
Word X Y Direction
ACCESSCONTROL  2020w
ADWARE  1019ne
ATTACK  2011n
AUTHENTICATION  216n
BUFFEROVERFLOW  215ne
COMPUTERFORENSICS  1818n
CRACKER  183sw
DENIALOFSERVICE  172w
EXPLOIT  1812nw
FIREWALL  73se
HONEYPOT  213ne
MALICIOUSCODE  1816nw
MALWARE  720ne
PACKETSNIFFING  46se
PASSWORDHASHING  1917n
PHYSICALSECURITY  163sw
PINGSWEEP  120ne
PORTSCANNER  12s
REMOTELOGINSERVICE  1111se
SESSIONHIJACKING  185sw
SMURFATTACK  2016n
SPOOFING  113w
SPYWARE  113se
TROJANHORSE  26se
TUNNELMODE  210se
USERIMPERSONATION  191w
VICTIM  818nw
VIRUS  814se
VULNERABILITY  520ne
WORM  146ne