Cybersecurity Tech Terms, Part 5

Edit Answers
DQFAUINRFDYMPKVXCRGLATSOFYODBZ PHCLFCZSFMPUKCABLATNEMERCNIHMG QEXPLOITKITSSURIVCITSIRUEHIISN OZCTQTDYRPBZSCISNEROFLATIGIDMI IILFINGERPRINTNVPRIGUQHCPCSKXF FACIALRECOGNITIONUHYOIYKUHEEPA CTBACKDOORPROGRAMTJHVIKSKDUGLO YPAKFVBOZEISOFXAXSDQOIKMCRJLLL BGBPDEZSBSSMJIKMLEENMGDDAZAHBR EETZYICWSNTKVSOXNGXCNCDDBUTABE RPMHPUKCABLAITRAPATADGNILAETSB SHEKOHANOITINIFEDSURIVWBLUCLKY LXOWBNOITCETORPATADIAHAYUAJDJC ANOITACITNEHTUACIRTEMOIBFQPEVI CMFQAXNACSSURIVJVIRUSSIGNATURE KVGDDMUFMLEHDAOLNWODYBEVIRDYOT IPDQCBROWSERPRIVACYTOOLSMUHKUB NGNIFRUSBEWSUOMYNONAAPMMURGGAB GNOITPYRCNEYEKETAVIRPTTLVOBRWD OFSKIPFVXJDPUBLICKEYENCRYPTION
1.
VirusSignature
2.
VirusDefinition
3.
VirusScan
4.
DriveByDownload
5.
BiometricAuthentication
6.
Fingerprint
7.
Gesture
8.
FacialRecognition
9.
IrisScan
10.
BrowserPrivacyTools
11.
AnonymousWebSurfing
12.
FullBackup
13.
IncrementalBackup
14.
PartialBackup
15.
DigitalForensics
16.
RaaS
17.
Cyberslacking
18.
Cyberloafing
19.
BackdoorProgram
20.
ExploitKits
21.
StealingData
22.
DataProtection
23.
UPS
24.
PrivateKeyEncryption
25.
PublicKeyEncryption
26.
HeuristicVirus