TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

Q M I T C I V U L N E R A B I L I T Y X
G V K A H E C I V R E S F O L A I N E D
N K L O R T N O C S S E C C A U W N E T
I S C I S N E R O F R E T U P M O C M D
K M H X P G R H Z H K U T A A I I R R G
C U P S O E A R I U N H S L T V O A C N
A R I N O B W D I N E S I A R W O C Z I
J F N Z F R L C E N W C N E F O T K S F
I A G J I J A L T O I O S X X L Q E H F
H T S B N V M I R O S N P P G F V R O I
N T W I G O C D U R I U Y L O R H W N N
O A E A D A H S E G P B W O I E L M E S
I C E E T A C P O A K G A I A V P U Y T
S K P I S O M L U P K D R T J O K S P E
S G O H D I E S W D W O E S U R I V O K
E N I E R T R O J A N H O R S E M X T C
S N I E O C H M R W H A I P T F B M S A
G L S M H J K E L L A W E R I F U Q N P
P U E W P H Y S I C A L S E C U R I T Y
C R P O R T S C A N N E R J A B H G N T
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# M I T C I V U L N E R A B I L I T Y #
2G # # # # E C I V R E S F O L A I N E D
3N # L O R T N O C S S E C C A # # N E #
4I S C I S N E R O F R E T U P M O C M #
5K M # # P # R # # # # U T A A I I R # G
6C U P # O # A # # # N H S L T V O A # N
7A R I # O # W # # N E S I A R W # C # I
8J F N # F # L # E N W C N E # O # K # F
9I A G # I # A L T O I O S X # L # E H F
10H T S # N # M I R O S N P P # F # R O I
11N T W # G O C D U R I # Y L # R # # N N
12O A E # D A H S E G # # W O # E # # E S
13I C E E T A C P O # # # A I # V # # Y T
14S K P I S O M L # # # D R T # O # # P E
15S # O H D I E # # # W # E S U R I V O K
16E N I E R T R O J A N H O R S E # # T C
17S N # E O # # # R # # # # # # F # # # A
18G # S M # # # E L L A W E R I F # # # P
19# U E # P H Y S I C A L S E C U R I T Y
20# R P O R T S C A N N E R # # B # # # #
Word X Y Direction
ACCESSCONTROL  153w
ADWARE  1313sw
ATTACK  29s
AUTHENTICATION  153sw
BUFFEROVERFLOW  1619n
COMPUTERFORENSICS  184w
CRACKER  184s
DENIALOFSERVICE  202w
EXPLOIT  148s
FIREWALL  1618w
HONEYPOT  199s
MALICIOUSCODE  164sw
MALWARE  710n
PACKETSNIFFING  2018n
PASSWORDHASHING  154sw
PHYSICALSECURITY  519e
PINGSWEEP  36s
PORTSCANNER  320e
REMOTELOGINSERVICE  1111ne
SESSIONHIJACKING  117n
SMURFATTACK  24s
SPOOFING  54s
SPYWARE  139s
TROJANHORSE  616e
TUNNELMODE  134sw
USERIMPERSONATION  219ne
VICTIM  71w
VIRUS  1815w
VULNERABILITY  71e
WORM  167ne