Cyber Security Word Search

Edit Answers
YDMCEWGJPDFDHHSWVQAC SVBKYCEECIMXMAVONRMC LJPYKBRAYJWDABQMKDIL ODWFVWEEYGOBPQFPIJCH RQEBGCARSVEMSJPHRNFN VZPYKWUWBCSRJHEICTUO VTBZPFTIIUCOOYCSRIDI JJWCPLHTMPLVHQKHYOHT PSMLFCEGXAYLAVDIPLHP VBXMXGNQCSLAYZQNTPKY DEDKACTVAUHWTINGOXBR IRHQUJIGNRBYATNFJEDC PALLDGCEMIAADRPGABDN FWLMFPARFVRZJAEDCAFE TDATGKTKBHDKEVTNKCVI GAWGXAISTULYCLLAIKTU UGEODBOAOJHXASPJNDND MPRZGANBVSIKPBKCGOXN LUIJEDFJPNYALXWTKOZY FRFVNKHRMNEJNEBBBRID
1.
Backdoor
2.
Malware
3.
Phishing
4.
Authentication
5.
Encryption
6.
cryptojacking
7.
theft
8.
virus
9.
adware
10.
firewall
11.
spam
12.
cyberbullying
13.
exploit