TCP/IP Puzzle

ACCESSCONTROL
ADWARE
ATTACK
AUTHENTICATION
BUFFEROVERFLOW
COMPUTERFORENSICS
CRACKER
DENIALOFSERVICE
EXPLOIT
FIREWALL
HONEYPOT
MALICIOUSCODE
MALWARE
PACKETSNIFFING
PASSWORDHASHING
PHYSICALSECURITY
PINGSWEEP
PORTSCANNER
REMOTELOGINSERVICE
SESSIONHIJACKING
SMURFATTACK
SPOOFING
SPYWARE
TROJANHORSE
TUNNELMODE
USERIMPERSONATION
VICTIM
VIRUS
VULNERABILITY
WORM

This word search contains words used in Chapter 9 of the TCP/IP course assigned book.

Try to find all 30 words on this board.

D W O L F R E V O R E F F U B S U R I V
P A S B P D E N I A L O F S E R V I C E
A H P O R T S C A N N E R E I D N D E S
S L Y E T F I R E W A L L R M F R C A D
S B T S T I O L P X E Z A I T L I O N D
W P O R I S F E O R O C H M N V C M O Q
O I P O T C R U A G C Z O P R I R P I J
R N Y H F P A W O E Z C A E D C E U T Y
D G E N V F L L S O I C S R Q T K T A T
H S N A A A E S S E K N V S J I C E C I
A W O J M D C T D E I E P O M M A R I L
S E H O D O I O T G C O R N R T R F T I
H E M R N D M S O E O U A A O G C O N B
I P A T Z L N L R F H H R T W Y K R E A
N D R J E I E A I E L N Z I H Y O E H R
G O Z N F T W N Q O P Q I O T P P N T E
L T N F O D G I E Y F K B N W Y Y S U N
Y U I M A L I C I O U S C O D E I I A L
T N E C K C A T T A F R U M S S L C E U
G R G N I K C A J I H N O I S S E S A V
Brought to you by WordSearchFun.com



Answer Key for TCP/IP Puzzle

X
Y
1234567891011121314151617181920
1# W O L F R E V O R E F F U B S U R I V
2P # # # # D E N I A L O F S E R V I C E
3A H P O R T S C A N N E R E # # # # E #
4S # Y E # F I R E W A L L R # # # C # #
5S # T S T I O L P X E # A I # # I O N #
6W P O R I # # # # R # C # M # V # M O #
7O I P O # C # # A # C # # P R I R P I #
8R N Y H # # A W # E # # A E # C E U T Y
9D G E N # # L L S # # C S R # T K T A T
10H S N A # A # S S E K N # S # I C E C I
11A W O J M # C # D E I E P O M M A R I L
12S E H O # O # O T G C O R N R # R F T I
13H E # R N # M S O E O U # A O # C O N B
14I P # T # L N L R F # # R T W # # R E A
15N # R # E I E A I # # # # I # Y # E H R
16G O # N F T W N # # # # # O T # P N T E
17L # N F O D G # # # # # # N # Y # S U N
18# U I M A L I C I O U S C O D E # I A L
19T N E # K C A T T A F R U M S # # C # U
20G R G N I K C A J I H N O I S S E S # V
Word X Y Direction
ACCESSCONTROL  135sw
ADWARE  518ne
ATTACK  1019w
AUTHENTICATION  1918n
BUFFEROVERFLOW  141w
COMPUTERFORENSICS  184s
CRACKER  1713n
DENIALOFSERVICE  62e
EXPLOIT  115w
FIREWALL  64e
HONEYPOT  312n
MALICIOUSCODE  418e
MALWARE  511ne
PACKETSNIFFING  147sw
PASSWORDHASHING  12s
PHYSICALSECURITY  12se
PINGSWEEP  26s
PORTSCANNER  33e
REMOTELOGINSERVICE  1111ne
SESSIONHIJACKING  1820w
SMURFATTACK  1519w
SPOOFING  1410sw
SPYWARE  1817nw
TROJANHORSE  414n
TUNNELMODE  119ne
USERIMPERSONATION  141s
VICTIM  166s
VIRUS  201w
VULNERABILITY  2020n
WORM  1514n