cyber

Edit Answers
XTPWBWUVIVSURHI WJYCWPVTIPRJJYM MPGHENCRYPTIONP VXDGZIBEPMDWUPE JCCKMIDYGRCGXUR OSJDIYZDHMQLWRS GKIVEFVLOBYFGVO AZRQWEXYSSIYEWN CMTOHQPOTFFIFGA VGHHAMFFWJFWWLT MORPHINGALMCSYI DUAUYUVJRKCSNKO LQAWNTOOEAEHVDN NVXCPHISHINGMMN DATAPOISONINGOC
1.
phishing
2.
encryption
3.
morphing
4.
deepfake
5.
DDOS
6.
ghostware
7.
datapoisoning
8.
impersonation