TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

S Y V G N I F F I N S T E K C A P H H S
J K P G P R E K C A R C N T B S K O I G
K L H A A T T A C K O C O I U U X R E A
J O Y R S P O O F I N G I O F R A C F U
D R S V S A T Z E D Q K T L F I I O I T
R T I E W E U M C M C J A P E V K M R H
E N C D O S N A I I P L N X R U E P E E
N O A O R R N L V T H C O E O L N U W N
N C L C D O E W R C W O S K V N G T A T
A S S S H H L A E I D N R C E E Y E L I
C S E U A N M R S V I U E A R R X R L C
S E C O S A O E F G L P P T F A J F P A
T C U I H J D F O S T G M T L B V O E T
R C R C I O E L L I O A I A O I S R E I
O A I I N R E E A I P T R F W L P E W O
P C T L G T P R I G Y Y E R O I Y N S N
O R Y A O T X A N I E S S U R T W S G U
M M Y M C K P W E S N N U M M Y A I N O
Q W E B G R O D D K O A V S O O R C I I
O R G N I K C A J I H N O I S S E S P O
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# # # G N I F F I N S T E K C A P # # #
2# # P # P R E K C A R C N T B S # # # #
3# L H # A T T A C K # # O I U U # # E A
4# O Y # S P O O F I N G I O F R # C F U
5# R S # S # T # E # # # T L F I I O I T
6R T I E W E U M C M # # A P E V # M R H
7E N C D O S N A I I # # N X R U # P E E
8N O A O R R N L V T # # O E O L # U W N
9N C L C D O E W R C # # S K V N # T A T
10A S S S H H L A E I # N R C E E # E L I
11C S E U A N M R S V I # E A R R # R L C
12S E C O S A O E F G # # P T F A # F P A
13T C U I H J D # O # T # M T L B # O E T
14R C R C I O E L L # O # I A O I S R E I
15O A I I N R E E A # P # R F W L P E W O
16P # T L G T # R I # Y # E R O I Y N S N
17# # Y A O # # A N # E # S U R T W S G #
18# # # M # # # W E # N # U M M Y A I N #
19# # E # # # # D D # O # # S # # R C I #
20# R G N I K C A J I H N O I S S E S P #
Word X Y Direction
ACCESSCONTROL  215n
ADWARE  820n
ATTACK  53e
AUTHENTICATION  203s
BUFFEROVERFLOW  153s
COMPUTERFORENSICS  184s
CRACKER  122w
DENIALOFSERVICE  919n
EXPLOIT  148n
FIREWALL  194s
HONEYPOT  1120n
MALICIOUSCODE  418n
MALWARE  86s
PACKETSNIFFING  171w
PASSWORDHASHING  52s
PHYSICALSECURITY  32s
PINGSWEEP  1920n
PORTSCANNER  116n
REMOTELOGINSERVICE  1111ne
SESSIONHIJACKING  1820w
SMURFATTACK  1419n
SPOOFING  54e
SPYWARE  1714s
TROJANHORSE  616n
TUNNELMODE  75s
USERIMPERSONATION  1318n
VICTIM  1011n
VIRUS  166n
VULNERABILITY  166s
WORM  1515s