Cybersecurity Tech Terms, Part 1

Edit Answers
FCMRAUVKCUJPFNNDFNANTIVIRUSLOO FOFZCGHMJGQNHMYZEGCRILOCXBDTGF ELHAWBBCWZYNMATPLAGIARISMXOHMD MDDTYCULFYYVATRPUDOIITJNMSWQVR ISNGNSYLRDSSLNNMEYWZGUEDXYWIXC RPBPHZEOKPOHWOFRITWGDNJNVZRADC CYGIIPOSOSYCARIPNNOISXIFKURHEA RWDSKTMOIXPTRTXQNFGOXJDVSRXSXS EAZFKWFDMKRAEYCAVIRPFONOISAVNI BRAIJIYDCTNUMADWAREQPKXSHRPDEB YETVNBMKPTROJANHORSEHUKUNXDSDK CLDGMROWMMRQQETIUSYTIRUCESWRZH CWPTTNEMEGNIRFNITHGIRYPOCCFUAQ AJZKYXELECTRONICEAVESDROPPINGW VJKKZZDFVIRTUALPRIVATENETWORKN CNBMOBCIGOLRRREZYLANATEKCAPQUD DATASKIMMINGERAWLAMITNAEPLAOKS UMFHNAYCSEERDABBDSECURITYRISKR CYPQFHXLMBQZUOJOZWHENITNARAUQD VGWNWZGJVLPUSTATZNZCRGQLYJKCQF
1.
Bot
2.
DDoS
3.
BulkSpam
4.
Virus
5.
Malware
6.
Worm
7.
TrojanHorse
8.
Rootkit
9.
Spyware
10.
SecuritySuite
11.
Adware
12.
Plagiarism
13.
CopyrightInfringement
14.
InvasionOfPrivacy
15.
ElectronicEavesdropping
16.
Pharming
17.
DataSkimming
18.
WarDriving
19.
CyberCrime
20.
Antivirus
21.
Antimalware
22.
Spoofing
23.
VirtualPrivateNetwork
24.
DarkNet
25.
packetAnalyzer
26.
Quarantine
27.
logicBomb
28.
piracy
29.
securityRisk