TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

G H F E P I N G S W E E P R E K C A R C
N Y P A S S W O R D H A S H I N G B M J
I Q H U Z P K W W G L M O Z A K U U E M
F L Y T R O J A N H O R S E K F S C D I
F P S H T O J L L A W E R I F E I O E T
I Q I E J F M T I O L P X E R V Q M N C
N H C N C I S J W H K A R I R U A P I I
S C A T M N S J O N M O M E S L T U A V
T W L I A G S U R I V P S K I N U T L R
E H S C H R Q W O E E N B C J E N E O E
K M E A X Z Z X R R I Q I A A R N R F N
C T C T M Z Q F S G D O T T T A E F S N
A A U I R K L O O V U O E T E B L O E A
P I R O O O N L A S P F R A R I M R R C
N M I N W A E Y C Y F Q A F A L O E V S
R E T Z T T Y O E Q E Z W R W I D N I T
F C Y I O M D N G N S E D U Y T E S C R
I I O M F E O E R A W L A M P Y W I E O
H N E X W H L O R T N O C S S E C C A P
A R G N I K C A J I H N O I S S E S T F
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1G # # # P I N G S W E E P R E K C A R C
2N # P A S S W O R D H A S H I N G B # #
3I # H U # P # # # # # # # # # # U U E M
4F # Y T R O J A N H O R S E # F S C D I
5F # S H # O # L L A W E R I F E I O E T
6I # I E # F # T I O L P X E R V # M N C
7N # C N # I # # # # # # R I R U A P I I
8S # A T # N # # # # # O M E # L T U A V
9T # L I # G S U R I V P S K I N U T L R
10E # S C # # # # # E E N # C # E N E O E
11K # E A # # # # R R I # I A # R N R F N
12C # C T M # # F S G # O T T # A E F S N
13A # U I R # L O O # U O E T E B L O E A
14P # R O O O N L # S P # R A R I M R R C
15# # I N W A E # C Y # # A F A L O E V S
16# # T # T T # O E # # # W R W I D N I T
17# # Y I O # D N # # # # D U Y T E S C R
18# # O M # E O E R A W L A M P Y # I E O
19# N E # # H L O R T N O C S S E C C A P
20# R G N I K C A J I H N O I S S E S # #
Word X Y Direction
ACCESSCONTROL  1919w
ADWARE  1318n
ATTACK  1414n
AUTHENTICATION  42s
BUFFEROVERFLOW  173sw
COMPUTERFORENSICS  184s
CRACKER  201w
DENIALOFSERVICE  194s
EXPLOIT  146w
FIREWALL  155w
HONEYPOT  619ne
MALICIOUSCODE  186sw
MALWARE  1418w
PACKETSNIFFING  114n
PASSWORDHASHING  32e
PHYSICALSECURITY  32s
PINGSWEEP  51e
PORTSCANNER  2019n
REMOTELOGINSERVICE  1111ne
SESSIONHIJACKING  1820w
SMURFATTACK  1419n
SPOOFING  62s
SPYWARE  1519n
TROJANHORSE  44e
TUNNELMODE  178s
USERIMPERSONATION  183sw
VICTIM  208n
VIRUS  119w
VULNERABILITY  166s
WORM  515n