Cybersecurity Awareness Wordsearch

Edit Answers
LMMNERCGBROOTKITAILGATING PRXJKJJVYAVZWKFIRUCZVXKIV BFIKUQZHEECNJWZWWRYBRKKSI IDENTITYNRAKJSSUIEBOLGGUR PHISHINGGUQCUQUHVHETFAIRU ZFHBWZAFIHVMYPYAHPRNRLPIS IBOKATUENRUWMZGCCISEGOTVF CQNFAWRVEFLRPUFKTCETNRAIN DEEFGARDESNJTAPEAOCIIOETD KHYDPQDGRHEWRWURPZUOMXRNR EXPLOITEIVRVUBLFMYRMRPHAO RCOEQTXXNWATWGBMBHIAAETJO ZCTTTYEYGXBSZCKPRPTLHRRND VFVAUTHENTICATIONAYWPAROK ZGLGCWHCMCLGJFFVORXAKWEIC SHLMPVDWRTIPALTIHGVRSMGTA MCLNIRQBRATLHUZPNOFEGOGPB IALQBSTMIIYJFNFSQTIPXSOYS SEQNDYDZMZRFVWZPAPRQFNLRP HRYJNANENCRYPTIONYEUKAYCY IBPNPNTPTAWGLZHONRWBSREEW NPENETRATIONZUVFPCAFSIKDA GZELCPJETROJANVIBBLDVNOZR RVSECURITYTHEFTNSHLXYOQNE YGZVYBPSOCIALUEGJINCIDENT
1.
Antivirus
2.
Authentication
3.
Backdoor
4.
Backup
5.
Botnet
6.
Breach
7.
Cipher
8.
Cryptography
9.
Cybersecurity
10.
Data
11.
Decryption
12.
Encryption
13.
Exploit
14.
Firewall
15.
Hacker
16.
Honeypot
17.
Identity
18.
Incident
19.
Intrusion
20.
Keylogger
21.
Malware
22.
Patch
23.
Penetration
24.
Pharming
25.
Phishing
26.
Ransomware
27.
Rootkit
28.
Security
29.
Smishing
30.
Social
31.
Engineering
32.
Spoofing
33.
Spyware
34.
Tailgating
35.
Theft
36.
Threat
37.
Trojan
38.
Virus
39.
Vulnerability