TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

A C P V U L N E R A B I L I T Y F G V L
P G G S M U R F A T T A C K H W N N R R
G U D C R A C K E R L N T F O I O P E G
N S Z I Q V W P M L N U C L H I N M N X
I E Z S J R R O A L N W F S T S O A N D
F R O N E B W W L N H R A A U T A C A E
F I D E Z S E P E Y E H C R E R P C C N
I M M R E R S L R V D I I L Z O G E S I
N P I O I T M I O R T V O F V J N S T A
S E T F Y O K R O N Z G A P P A I S R L
T R C R D C E W E N I K E J S N F C O O
E S I E A F S H C N H E A P N H O O P F
K O V T F S T B S O W I Y O J O O N J S
C N T U A U N E N S E W J K N R P T Y E
A A B P A D R E G R A P J A M S S R G R
P T O M K V Y N A R Q I A R C E I O B V
A I Q O I P I W E X P L O I T K C L H I
J O K C O P D H E R A W L A M S I B C C
C N E T M A L I C I O U S C O D E N F E
V E P H Y S I C A L S E C U R I T Y G Z
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # # V U L N E R A B I L I T Y # G # #
2# # # S M U R F A T T A C K # W N N R R
3G U # C R A C K E R L # T # O I O # E #
4N S # I # # # # # L # U # L H I # M N #
5I E # S # # # # A # N # F S T S O A N D
6F R # N E # # W # N # R A A U T # C A E
7F I # E # S E # E # E H C R E R # C C N
8I M M R # R S L # V D I I L # O G E S I
9N P I O I # M I O R T V O # # J N S T A
10S E T F # O K R O N # G # P # A I S R L
11T R C R D C E W E N I # E # S N F C O O
12E S I E A F S H # N H E # P # H O O P F
13K O V T F S T # S O W I Y # # O O N # S
14C N T U A U # E N S E W J # # R P T # E
15A A B P A # R E G R A # # A M S S R # R
16P T # M # V Y N A R # # # R C E # O # V
17# I # O I P I W E X P L O I T K # L # I
18# O # C O P D # E R A W L A M # I # # C
19# N E T M A L I C I O U S C O D E N # E
20# # P H Y S I C A L S E C U R I T Y G #
Word X Y Direction
ACCESSCONTROL  185s
ADWARE  619ne
ATTACK  215ne
AUTHENTICATION  515ne
BUFFEROVERFLOW  414ne
COMPUTERFORENSICS  418n
CRACKER  43e
DENIALOFSERVICE  205s
EXPLOIT  917e
FIREWALL  410ne
HONEYPOT  1112sw
MALICIOUSCODE  519e
MALWARE  1518w
PACKETSNIFFING  116n
PASSWORDHASHING  415ne
PHYSICALSECURITY  320e
PINGSWEEP  618ne
PORTSCANNER  1912n
REMOTELOGINSERVICE  1111sw
SESSIONHIJACKING  45se
SMURFATTACK  42e
SPOOFING  1715n
SPYWARE  1511sw
TROJANHORSE  166s
TUNNELMODE  133sw
USERIMPERSONATION  23s
VICTIM  313n
VIRUS  129ne
VULNERABILITY  41e
WORM  1218ne