Basics of Information Security

Edit Answers
FQVNVXPGUDOQQGGPTDXL IHVDFQFTFGAPXZNJMVUL RLHSRAUTHENTICATIONN ETIPSHAHNEIVFTJYOYMO WKVAONZZCRISIZUAJOAI ACCMVISIQAUDWDKMYALT LVUWNZNDIWNFCCXSBMWP LJZQOOUGYMQLIVQXUMAY MPUPHSZWTOTKLUOMJARR KZBRNUDYISVOBLCJYUEC XJSSSRRCRNDMUNHCEBRN VRCKQIOAUAPEPVIRUSKE YYEQYVWVCRHEEFTYVQKC DNNEMISIENIRPTHCNLDJ BPPCWTSRSISAWFMAPUFQ UOVZONAPRUHWMHNXHCFI ZNHGIAPXEYIYUBTFKVPZ DVSIJVGQBFNPIKAAUWUL UYDLXZSKYUGSDBACKUPS MSUDEEKYCQWICJYCXRYQ
1.
ANTIVIRUS
2.
AUTHENTICATION
3.
BACKUP
4.
CYBERSECURITY
5.
ENCRYPTION
6.
FIREWALL
7.
MALWARE
8.
PASSWORD
9.
PHISHING
10.
PRIVACY
11.
PUBLICWIFI
12.
RANSOMWARE
13.
SPAM
14.
SPYWARE
15.
VIRUS
16.
VPN