Word search

Edit Answers
LXLOBQTPOKPKPMRNGFOA AQDTKRAAKMAIERHNOQVJ GNYYROFNLFNRHLSEAIOT DKBTDDOBYQAWVSOVGOMP UTKHCHPMMWYFLDEDWYJE IWHGABYBEDMCTRIJNAHZ SHBQJYNLJNEWETCZZSTP SZOIFMAYURNHRYOGBERA EKRXDMVGTWWIIUVZIYHC CMTMWUCIYMSGMEXRHJFK CDGPNYFCOSYADPIMRAVD AGKJHIQSMXFHYTIFRTMJ EXXUCINBDVKYMOWGIGRG TFTABASFSGIJQXIEWQWI OETCRVRHEBAQACFMEKYO MEYSECURITYQUESTIONS EKNPJNBHANJLRXUTDLNG RSKUJVAMWWGGOSDCZQVZ SZFSEAFWNWYIGAQRBRYV UPWZLDSECURITYBREACH
1.
software designed to gain unathorized access to and disrupt or damage a computer system
2.
when a scammer impersonates or claims to represent a legitimate company online in order to trick you into giving your information or giving your money
3.
malicios software that blocks access to a phone or computer system until a sum of money is paid
4.
the ability to control your device through another phone or computer it usually requires downloading some kind of app or software
5.
when the data a company stores is exposed to a hacker this data could include email address, passwords, or credit card information of the companys customers and accociates
6.
an alternate way of identifying costomers when they have forgotten a password entered the wrong creditentials or triend login from unfamiler device
7.
a way for websites to prove they are encrypting or making it harder for a hacker to gain access to the data on their site if you use an ssl certifacate you have a higher of your information being exposed or stolen