Treasure Hunt - Round 1

Edit Answers
PJPCRDRSJAJPHSIGDFFHJUYQFBVVPC LHYYCOEWVDNETWORKIQHSPGZRBRJWM RNJCEQEPCBBCOZDPBRENKBUBGOZPMJ YPGIXJIKULKRBWMZVEGFZYJIUHRRCV NNLRLSZGLYBZIFURVWZZNIRYULQRIW RJAEMBRTEDVMJPGRYAMAYRAJWFDLVW VEQPRFITGTKEGRNKCLFEJSNSXVBTJB MDFKACNZAGYKRRJSZLJUBGSTIYUVJO TDKAKSWIQVCVCACIAYITFKOKAATADA WECZSZSAQXJYSGWBRIABWDMXPKXJIJ DNIBXRPWKRUHBFULOOUARKWUPZNHAZ ACVELJEHOMLZJAVUAATPVNAUOLILFC LRQMWUXBIRXLQELFYMHHISRMFMLCEU DYBHSLQKYSDUXJNEXVEXUPENVUBZRE VPSPYWARECHIMURZYHNPHDOKBJQEIV VTZNMWTUSYVINAHJXBTSSIXKIOJPSI VIJTROSGPPYNNSWISQIGIKZVZWRZHN SOLDUDRJDEHSBGNWRUCMKFJWZKQBNR ANRHAQKYMSTXYAOIIMAIPABEIEQRJP PJWTGTYXBMLGLMHRMPTYWODECBHWJH ARZINUNGCPDNZJHABZIXPZNLUYMEZL HBLAQCFWQTRUFOEVKQOWZWZREKCAHP YBHNYLMRYSPIDTIKEDNYYXCZYMPJUJ CGQTTYKDZZKBVTCBPGBJDDMUXTWNTB IEXIWWBSLBFOPACHADUNIIVIXYKHRC NQSVLFCBBOOASGCVCXLBDQHOULTKVX TMAIPILUBYDRLLRYKOAHUYQMSMPHBT ZFLRLFYZYVVULNERABILITYKRHQPVA UBEUMPMCNMOKFOBQJRLIYZFDYEMJWE WMVSTXJVQYSPDKETVZHCWSIMZAQSWO
1.
PHISHING
2.
PASSWORD
3.
FIREWALL
4.
MALWARE
5.
ENCRYPTION
6.
HACKER
7.
ANTIVIRUS
8.
PRIVACY
9.
DATA
10.
NETWORK
11.
SPYWARE
12.
RANSOMWARE
13.
CYBERSAFE
14.
AUTHENTICATION
15.
VULNERABILITY