Cybersecurity, Word Search

Edit Answers
MUIPTRTFQEWQBVDTVQKPAZZAS RCKNHKWDJKXXPBJCNWDVXSCCM CULZJTCSVQUQNOISURTNINEJY JGRLUKFYWOVCYYBZKOVASDVDV KUGWIAGTVXYODRDCBJFOVHFSK IMSBITMLYJQALAMPHISHINGVR NXGDNYNIRKBBVUNWPXASCTNGH AERAWMOSNARHRTYSRHYORZIFI ECIVAIAZFKIJKHHQEAMLZPRXL HRNVDDKHXLNEVESJWDPUSFECY YBOKWBBOFYHRENOICCAASZEGI UGIFAALHAETASTDTMVMNDUNRC WOTIRGAQCWEWAIDMQJIJJKIHY BYPREDCSRQJLECZGKTHVQNGGB NNYEPNKWOWQAHAADCNCSIQNRE YRRWNALORPBMMTYIFIAPIIEYR OOCAZCIYDQXDUIPFXOEYHKLCS JTNLTLSRXXGDNORXJPRWTTAEU NCELUCTOLKBHCNTSWDBAREIBR MAGNVULNERABILITYNARANCPA VFYTIRUCESREBYCCAETESTOAK ZOKKMBIOMETRICSNNMAGAOSTS WWLNWHITELISTPFIDODPCBGCH ETNNYXSTYIURNSSLJIOGZEKHI DKZYYCTYFHZLCOMRRCLQLJITT
1.
Cybersecurity
2.
Phishing
3.
Malware
4.
Ransomware
5.
Firewall
6.
Encryption
7.
Authentication
8.
Vulnerability
9.
Spyware
10.
Adware
11.
DDoS
12.
Botnet
13.
Patch
14.
Endpoint
15.
Intrusion
16.
Whitelist
17.
Blacklist
18.
Biometrics
19.
TwoFactor
20.
SSL
21.
DataBreach
22.
SocialEngineering
23.
Sarthi
24.
SCCM
25.
FIDO
26.
CyberSurakshit