TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

O G F B P A C K E T S N I F F I N G H Y
W C Y V M A L W A R E M D X S R L C L T
S D E N I A L O F S E R V I C E V X E U
P S C I S N E R O F R E T U P M O C D S
R E B E D O M L E N N U T I A E I L P E
J S U Y T I L I B A R E N L U V O H A R
U S F I R E W A L L M G I O R R Y U S I
W I F A E R A W Y P S C H E T S T R S M
R O E P L S C R V W I W S N I H R S W P
E N R E U R E I E O O N O C E O O M O E
N H O J G K C E U T I C A N C N J U R R
N I V R C T P S X G S L T T V E A R D S
A J E A I Q C J O S S I T A I Y N F H O
C A R M X O V L E E C P S X R P H A A N
S C F O D M E C C A X O O G U O O T S A
T K L E R T C U T D T P C O S T R T H T
R I O O O A R I J W Q T L T F A S A I I
O N W M Y I O G E A Q M A O J I E C N O
P G E R T N A L S R N G Z C I G N K G N
E R Y Y A J J X O E N Y B D K T W G M U
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # # # P A C K E T S N I F F I N G # #
2# # # # M A L W A R E # # # # # # # # #
3# D E N I A L O F S E R V I C E # # E U
4# S C I S N E R O F R E T U P M O C # S
5# E B E D O M L E N N U T I A # I L P E
6# S U Y T I L I B A R E N L U V O H A R
7# S F I R E W A L L # G I # R R Y U S I
8# I F # E R A W Y P S C # E T S T # S M
9R O E # # # # R V W I # S N I H R S W P
10E N R # # # E I E O # N O C E O O M O E
11N H O # # K C E U # I C A N # N J U R R
12N I V # C T P S # G S L T # V E A R D S
13A J E A I # C # O S S I # # I Y N F H O
14C A R M # O # L E E C P # # R P H A A N
15S C F # D M E C C A X # O # U O O T S A
16T K L E R T C U T D T P # O S T R T H T
17R I O O O A R I # W # T L # F # S A I I
18O N W M # I O # # A # # A O # I E C N O
19P G E # T N # # # R # # # C I # N K G N
20# R # Y # # # # # E # # # # K T # G # #
Word X Y Direction
ACCESSCONTROL  617ne
ADWARE  1015s
ATTACK  1015se
AUTHENTICATION  196sw
BUFFEROVERFLOW  36s
COMPUTERFORENSICS  184w
CRACKER  215ne
DENIALOFSERVICE  23e
EXPLOIT  1014se
FIREWALL  37e
HONEYPOT  169s
MALICIOUSCODE  164sw
MALWARE  52e
PACKETSNIFFING  51e
PASSWORDHASHING  195s
PHYSICALSECURITY  195sw
PINGSWEEP  154sw
PORTSCANNER  119n
REMOTELOGINSERVICE  1111ne
SESSIONHIJACKING  24s
SMURFATTACK  189s
SPOOFING  1113se
SPYWARE  118w
TROJANHORSE  178s
TUNNELMODE  135w
USERIMPERSONATION  203s
VICTIM  99sw
VIRUS  1512s
VULNERABILITY  166w
WORM  318ne