TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

G S U R I V U L N E R A B I L I T Y H X
N R G N I K C A J I H N O I S S E S J B
I I E L O R T N O C S S E C C A S C B N
F R P M A L I C I O U S C O D E J I U Q
F B H Z O X W K C A T T A F R U M S F R
I N Y R F T R O J A N H O R S E E N F D
N T S J E U E X P L O I T P M R Z E E E
S F I L X N Q L X O C H O L I U P R R N
T R C L T N N G O F V O F M B X E O O I
E E A A T E Q A J G F I P G Q D E F V A
K K L W A L K K C I I E C M R O W R E L
C C S E A M C T N S R N O T D J S E R O
A A E R Y O A G O S T D S X I P G T F F
P R C I C D T L O P O R M E Y M N U L S
S C U F M E T N W P Y B O W R Y I P O E
T L R P K G A D W A R E A P W V P M W R
P D I W J T S P A J R R N G G P I O X V
K L T I I B G F Y R E E H O Z S V C B I
Y H Y O N O I T A C I T N E H T U A E C
J M N G N I H S A H D R O W S S A P F E
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1G S U R I V U L N E R A B I L I T Y # #
2N R G N I K C A J I H N O I S S E S # #
3I # E L O R T N O C S S E C C A # C B #
4F # P M A L I C I O U S C O D E # I U #
5F # H # O # # K C A T T A F R U M S F #
6I # Y R # T R O J A N H O R S E E N F D
7N # S # E U E X P L O I T P # R # E E E
8S # I L # N # L # # # # O # I # P R R N
9T R C L # N N # O # V O # M # # E O O I
10E E A A # E # A # G F I P # # # E F V A
11K K L W # L K # C I I E C M R O W R E L
12C C S E # M C T N S R N # T # # S E R O
13A A E R # O A G O S T # S # I P G T F F
14P R C I # D T L O P # R # E Y M N U L S
15# C U F # E T N W # Y # O W R # I P O E
16# # R # # # A D W A R E A P # V P M W R
17# # I # # T # # # # R R N # # # I O # V
18# # T # I # # # # # E E # O # # # C # I
19# # Y O N O I T A C I T N E H T U A E C
20# # N G N I H S A H D R O W S S A P # E
Word X Y Direction
ACCESSCONTROL  163w
ADWARE  716e
ATTACK  716n
AUTHENTICATION  1819w
BUFFEROVERFLOW  194s
COMPUTERFORENSICS  1818n
CRACKER  215n
DENIALOFSERVICE  206s
EXPLOIT  77e
FIREWALL  415n
HONEYPOT  1519nw
MALICIOUSCODE  44e
MALWARE  612se
PACKETSNIFFING  114n
PASSWORDHASHING  1820w
PHYSICALSECURITY  34s
PINGSWEEP  1716n
PORTSCANNER  1416nw
REMOTELOGINSERVICE  1111se
SESSIONHIJACKING  182w
SMURFATTACK  185w
SPOOFING  156sw
SPYWARE  1712sw
TROJANHORSE  66e
TUNNELMODE  66s
USERIMPERSONATION  194sw
VICTIM  119se
VIRUS  61w
VULNERABILITY  61e
WORM  1711w