Cybersecurity Tech Terms, Part 4

Edit Answers
XLRCDXHANTISPYWARESMJPAVLSODVI YBVVBWIDNMTHGPJLBKOPYXBBXDJXYD DLOGICALPORTXZSOFTWAREUPDATESE ZASWHJOXUNCRPCYIPOROODKCABJDIN TPCEADCWHGNINNACSFUTIJRIHWTIST POWJRAYBIHXACBAAGNIFOOPSNPYHGI QQDAGTBDNWBJYHOZNKBNSKVQFVZONT TQEFRBEXNOITACITNEHTUADTBFQMIY POLYMORPHICVIRUSNDXAOVYCQBNERT SGYXALSJMFPLCRJALLAPRQKPGHDTEH UEKCRQPHARDWAREFIREWALLFOUEITE PHKFFCAUXSMACSLGNIPPAZREPUSTLF GPVISOCGNITXETERPAXLRKBUQUXLIT EPZDDOEQUJCYBERSECURITYPYGWEFY AJKYADQZOSLANIMIRCREBYCIXIUFTI WDQDSTRAPDOORXUEQIYFRCFYIAWRET VSZKXQMFEGIHDRLERAWERACSBEEAKV RKTIMEBOMBCMBEFLNFQJXBCTHDPUCK AHUBSMQYDCFIIBSVXYFIDDEBZNNDAD YQUCMGNIHSIHPRAEPSINLWVQPKMIPX
1.
HardwareFirewall
2.
AntiSpyware
3.
Cybersecurity
4.
SoftwareUpdates
5.
Scanning
6.
SuperZapping
7.
Spoofing
8.
TimeBomb
9.
TrapDoor
10.
Scams
11.
IdentityTheft
12.
HomeTitleFraud
13.
Scareware
14.
PolymorphicVirus
15.
Authentication
16.
Backdoor
17.
DoS
18.
SpearPhishing
19.
PreTexting
20.
Cyberspace
21.
CyberCriminals
22.
LogicalPort
23.
PacketFiltering