Icebreaker Question: Introduction to Cyber Security

Edit Answers
TROJANNAGSRJNHRVKJWH JLERDLNXSOZBYNQAKHMQ TAKAUTHENTICATIONPHP NBWSSVQCOBTDLOGBPAPZ SMQNOHLZTGDMXFAOOTEL CSVACHJQFZOMSAGBVCRA FLOJRFDYCCSNRVMDVHAM TQVLRNVPOCPHISHINGWE RCDLOVSQLBAYRPJAHWYK SQAAQTPMLIESAVRLMMPK EHPWWMRPMJHWWNTKSXST RHNENNEXZLVGUPYSMXYR AMIRWPVYRENCRYPTIONZ WEWIKYUBWHPQYUOMZYOA LORFUIVZBASHUGZFYGGE ANNDABEYZCZAGZQQGZTH MZQKQUYAAKOQMWNMMRLG GJGZVBZXNEFGYUCCTAMX QZUSCUVCVRSBHEGIRTDK UVDPHVLBPCCEWVIRUSTO
1.
Firewall
2.
Encryption
3.
Phishing
4.
Malware
5.
Virus
6.
Trojan
7.
Hacker
8.
Spyware
9.
Patch
10.
Authentication