TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

K N U S E R I M P E R S O N A T I O N G
D E N I A L O F S E R V I C E E I L G N
P L E K M U K H L L A W E R I F B N V I
A O P C G Y T U N N E L M O D E I D R F
S R H O I L W H Y Q F C H U E K K E F F
S T Y M R V L O E S C P V O C A K M E I
W N S P A T R M L N U Y E A F C R R V N
O O I U C L S E P F T R J E A O A R U S
R C C T F V W C S M R I I R W W I N G T
D S A E T D I A A N H E C V D S S T S E
H S L R I Z N C R N I O V A M S G G R K
A E S F O Z R W O E N G N O T I Z N U C
S C E O L X E I P T L E O E R I T P I A
H C C R P I S O E Z Z F R L Y E O C U P
I A U E X S P Y W A R E C O E P F N I C
N T R N E E S R O H N A J O R T O F C V
G T I S M U R F A T T A C K I R O T U H
M A T I A E D O C S U O I C I L A M G B
S C Y C I V U L N E R A B I L I T Y E E
G K G S P O O F I N G F O C B N E I Y R
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # U S E R I M P E R S O N A T I O N G
2D E N I A L O F S E R V I C E # # # G N
3P L E # # U # # L L A W E R I F # N # I
4A O P C # # T U N N E L M O D E I # R F
5S R H O I # W H # # # # # # # K # E # F
6S T Y M R V # O E S # P # # C # K M E I
7W N S P A T R # L N U # E A # C R R # N
8O O I U # L S E # F T R J E A O A # # S
9R C C T # # W C S # R I I R W W # # # T
10D S A E T # # A A N H E C V D S # # # E
11H S L R I # # # R N I O V A M # G # # K
12A E S F O # # # O E N G N O T I # N # C
13S C E O L # # I # # # E O E R I T # I A
14H C C R P # S # # # # # R L Y E O C # P
15I A U E X S P Y W A R E # # E P F N I #
16N T R N E E S R O H N A J O R T O F # V
17G T I S M U R F A T T A C K # # O T U #
18# A T I # E D O C S U O I C I L A M # B
19# C Y C # V U L N E R A B I L I T Y E #
20# K # S P O O F I N G # # # # # # # # R
Word X Y Direction
ACCESSCONTROL  215n
ADWARE  1411ne
ATTACK  215s
AUTHENTICATION  52se
BUFFEROVERFLOW  1917nw
COMPUTERFORENSICS  44s
CRACKER  1310ne
DENIALOFSERVICE  12e
EXPLOIT  516n
FIREWALL  163w
HONEYPOT  1110se
MALICIOUSCODE  1818w
MALWARE  46se
PACKETSNIFFING  2014n
PASSWORDHASHING  13s
PHYSICALSECURITY  34s
PINGSWEEP  2014nw
PORTSCANNER  34se
REMOTELOGINSERVICE  1111nw
SESSIONHIJACKING  417ne
SMURFATTACK  417e
SPOOFING  420e
SPYWARE  615e
TROJANHORSE  1616w
TUNNELMODE  74e
USERIMPERSONATION  31e
VICTIM  2016nw
VIRUS  1410nw
VULNERABILITY  619e
WORM  159ne