Cat Word Search

Edit Answers
KGLCZTGJIXQOQVOPXCRT ISXKQUPURUHRSMNPUHFV BWTVDEEDJMOGNMQVMCCP PHISHINGTHEQOZHXRAIS OMWAQAWWHFSJICUEGEMH MCJCVBGTKBETTTJUWRAM THQJRQYZMGFZSWNKNBLL CDPYQVUZIASPEQACFYWR TJIVLEYOOMYVUEXJZTAT MXYRPWUDLOTQQDXFWIRS QRKIASQEDNBLYQJLAREX GATBCNMUEQOBTBTCBUEK IQRIHGSRIPVYIKTZICAD VXRANHXOLUUTRLNOFEIB MRTTHLOUMARCUZPCASMD IYUPFOJDVWPFCMKRQJOF MHAICLLHMNASEAFYMFEE SKQKCVRRUDERSZZEREKF PJJTDCKFAQGIEUYIRNSO IYJXEBLXUTQHIAGYEQAM
1.
software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
2.
fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
3.
type of malicious software designed to block access to a computer system until a sum of money is paid.
4.
when the data is used
5.
the state of being free from danger or threat.SSLcertificate