Cybersecurity Tech Terms, Part 5

Edit Answers
PHRULNXTZPCNEFHPHBSIIMECBEQTJV ACCQZJYLRGERUTANGISSURIVLPMQQS RXBUQHFLTDIGITALFORENSICSUARDQ HFBXBUBROWSERPRIVACYTOOLSOJLOQ TZPRNAAUZRFGIACYBERLOAFINGDVZY NMUFHFDFULLBACKUPHZUHFLAUZAAEA IJKKLQAKKHTMKCHCNITCGRNGRDTHDV RKCPIQOFIDEVLJECLCXRVTSGBGADHK PJAXCFLFACIALRECOGNITIONVEPADH RTBIZNNPUKCABLATNEMERCNIISRTIM ETLEQOWDGAPTPRSCBYDGICVPRTOAMC GZACIMOJCYBERSLACKINGYFHUUTDIP NVIRUSDEFINITIONAABSBRGASREGGH ICTFJOYYTULGMXSKKRPQETDYSECNAV FNRVTLBBIOMETRICAUTHENTICATION QCALLSEGHKVIWFQGCFJOPCQEAXILYS THPEFYVMARGORPROODKCABMONIOAAJ BPBUYPIMROCAUOMMCKSUSZLQZNNEHO JCHTNIRIRISSCANEXPLOITKITSCTOA WEFJWJDANONYMOUSWEBSURFINGCSTD
1.
VirusSignature
2.
VirusDefinition
3.
VirusScan
4.
DriveByDownload
5.
BiometricAuthentication
6.
Fingerprint
7.
Gesture
8.
FacialRecognition
9.
IrisScan
10.
BrowserPrivacyTools
11.
AnonymousWebSurfing
12.
FullBackup
13.
IncrementalBackup
14.
PartialBackup
15.
DigitalForensics
16.
RaaS
17.
Cyberslacking
18.
Cyberloafing
19.
BackdoorProgram
20.
ExploitKits
21.
StealingData
22.
DataProtection
23.
UPS