Cybersecurity Tech Terms, Part 1

Edit Answers
NREQNDKHSOCIALENGINEERINGWUVLBHNDCB MKCYBERCRIMEBXLYHGRPHIKWQHVNUAWNEYF WKDLJVUMCYEUXMWECJDUUXDYHLKZBOMORAF PEDISVOGNWFJUSBGKARHCYWVZOKEXMZCACM TSNTVDLDOEQLUKVFKHVOSEHDIITLDISPWJO DZOOOXDOZKPEZSIQTMRIOUSEWYOGXZLJLKA MJNOEDPWBUYDDJNILISDRTRODCKHKFSGATQ UFXFIMNJVQONBRJBXEHIUPKIDGIVZVNSMRP ERBJDDKXEHBEFNWORMTVRTFIVDOZDIPEIUD DATASKIMMINGBRRAJYTRGAOOTIBLMWRGTGA AUZDSTRONGPASSWORDSROGICNATRZAHKNGT ECTPZCSNVQOEXDTQJJHIVJCGWOANWRREANA XVIRTUALPRIVATENETWORKAHAHILADWOSIB ELECTRONICEAVESDROPPINGNPLASJRTHPFR OJMDOPXXDOZTCEUUZIRUOMPUHMPNAIMAYOE KFSSELXTOBCYBERVANDALISMYOBBGVFQWOA OHYUSNIFFINGVMAPSKLUBYHPCARFPINWAPC GIARCOPYRIGHTINFRINGEMENTAGSSNAIRSH CSLIAQYUTROLLINGXZSQXTHEFTDHEGKZEBT XUSVTHGOSYBNKPBVCATFISHINGXMZKGSMAF
1.
Bot
2.
DDoS
3.
BulkSpam
4.
Virus
5.
Malware
6.
Worm
7.
TrojanHorse
8.
Rootkit
9.
Spyware
10.
Adware
11.
Plagiarism
12.
CopyrightInfringement
13.
InvasionOfPrivacy
14.
ElectronicEavesdropping
15.
Pharming
16.
DataSkimming
17.
WarDriving
18.
CyberCrime
19.
Antivirus
20.
Antimalware
21.
Spoofing
22.
VirtualPrivateNetwork
23.
DataBreach
24.
StrongPasswords
25.
catfishing
26.
theft
27.
sniffing
28.
cyberVandalism
29.
socialEngineering
30.
trolling