TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

P E U S E R I M P E R S O N A T I O N P
H R P A S S W O R D H A S H I N G S D C
Y N E B U F F E R O V E R F L O W C H R
S Y Z M H T R O J A N H O R S E G I G A
I V P P O Z H K C A T T A F R U M S F C
C U O A H T R E D G X Y J M N D E N H K
A L R C C J E W N E R A W Y P S V E G E
L N T K M C A L Y T L D S O S L X R D R
S E S E O R E A O L I K C I C P V O T M
E R C T E W O S A G F C O H L T C F O A
C A A S U N T W S P I N A O X S O R P L
U B N N J N E M E C H N I T U V K E Y W
R I N I G R N E O I O T S O I X V T E A
I L E F I N W E J W U N I E G O P U N R
T I R F J S I A L M Q C T T R H N P O E
Y T J I G N C F P M I S U R I V V M H V
Y Y G N C K Q U O L O T Z C O L I O X F
B K I G I F I M A O Y D C J K L Q C E S
Y P I N X I N M E Z P O E I F Q T O E N
B R G D E N I A L O F S E R V I C E X K
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1P # U S E R I M P E R S O N A T I O N #
2H R P A S S W O R D H A S H I N G S # C
3Y # E B U F F E R O V E R F L O W C # R
4S # # M # T R O J A N H O R S E # I # A
5I V P P O # H K C A T T A F R U M S # C
6C U O A # T # E D # # # # # # # E N # K
7A L R C C # E W N E R A W Y P S # E # E
8L N T K M C A L # T L # # # S # X R D R
9S E S E # R E # O L I # # I # P # O T M
10E R C T E # O S A G # C O # L # C F O A
11C A A S U # # W S P I N A O # S # R P L
12U B N N # N E # E C H N I T U # # E Y W
13R I N I G R N E # I O T S O I # # T E A
14I L E F I N W E J # # N I E # O # U N R
15T I R F # S I A L M # C T # R # N P O E
16Y T # I G # C F # M I S U R I V # M H #
17# Y # N # K # # O L O T # # O # I O # #
18# # I G I # # # A O # D C # # L # C # #
19# P # N # # # M # # P # E I # # # # E #
20# # G D E N I A L O F S E R V I C E # #
Word X Y Direction
ACCESSCONTROL  46se
ADWARE  105sw
ATTACK  135w
AUTHENTICATION  42se
BUFFEROVERFLOW  53e
COMPUTERFORENSICS  1818n
CRACKER  202s
DENIALOFSERVICE  420e
EXPLOIT  187sw
FIREWALL  415ne
HONEYPOT  1916n
MALICIOUSCODE  819ne
MALWARE  209s
PACKETSNIFFING  45s
PASSWORDHASHING  32e
PHYSICALSECURITY  11s
PINGSWEEP  219ne
PORTSCANNER  35s
REMOTELOGINSERVICE  1111se
SESSIONHIJACKING  185sw
SMURFATTACK  185w
SPOOFING  1220nw
SPYWARE  167w
TROJANHORSE  64e
TUNNELMODE  410se
USERIMPERSONATION  31e
VICTIM  1520nw
VIRUS  1616w
VULNERABILITY  25s
WORM  811nw