Cybersecurity Tech Terms, Part 2

Edit Answers
EPVOSKTRYHDQHACKINGOXOBZRMYPSY MLGPOXXJKQOIXZFGUNTOOPAIIPBULL SLQKOXTGQKROWTENEIBMOZSOEOXEIM IBCNUHNNFYJPFQKFRANSOMWAREFRTE LFOJZATIEVHEJVZCKNKHUGRAYHATBT AKMTPCNNNIHPCQQMWFMMYMCUYEJGDH DEPXLKFICTAVCOCHWWNHGDQZMNQNTI NYUENIYTREPORPLAUTCELLETNIHOAC ALTDCNXNYRTSBZCMYLRDARKWEBQIHS VOEGXGOAPCATFISHINGCBBVKWRYTKO RGRNGPFRTPGNIREENIGNELAICOSACL EGEIQSHAIGNITIEFRETNUOCPSJRLAT BETFVQDUOCDMCOPYRIGHTXHPVEWULZ YRHFCFIQNKHVLAPHBNESKTAXYYYCBU CVIILLAWERIFERAWTFOSDBEYJEJODX TWCNZFUYHKXAEIWTAHETIHWNVVRNWH AZSSXXMZYEUPMLBTROLLINGETHUITK JQOHXMHQFTPCOVZVRTJHQHIIROIIDX WVMEHYNXEPBZZQZBVWYVFSQOVOBDVV NVXIPEJKVAQMFMLSNAIJERYBOSBVIU
1.
Catfishing
2.
Theft
3.
Sniffing
4.
cyberVandalism
5.
SocialEngineering
6.
Trolling
7.
Encryption
8.
BotNet
9.
Quarantining
10.
Inoculation
11.
SoftwareFirewall
12.
GrayHat
13.
WhiteHat
14.
BlackHat
15.
Ransomware
16.
ZombieNetwork
17.
Hacking
18.
DarkWeb
19.
Keylogger
20.
Ethics
21.
ComputerEthics
22.
Copyright
23.
IntellectualProperty
24.
Hacking
25.
Counterfeiting