Data Privacy Day

Edit Answers
IQMCQKCEZOSFNAGJLKRCIQATG GDNAQZOCXSXMDACKKNHKFBHZK KAEMZSUJROOSWWAQSEKHGSFWO VTVNIZRNVGMWKCOOKIESYCRCK VEPATIEIITGNVTDTNKNHGNPCC NWJYSIAXRVSAIKVVSQOAOGUMP ODDOAHTMUNTPJBHANIIIKPJEW AOYYWUHYSNSHYDKBEDTLDQJBW ONUPCQJTAUDODWEODZPCWIHFY EIZUVAZLNYOXEGAYNWYMKNILO QWXFVKMYWQHREMNREERSJXAHW XRTSBYFKGBXYSRWIEZCXMBPUF AKNOLCDHSNLJBSAZTYNKJNPOT XGITNGBLNBYDIPOWZXEMBJEYW RNIKOBNGMUNSBOQCLVEILADBN ZBAMTBANBRYZJHBTIAITLTEKR GAQSJYDTHJPQWXIDGAMIEPVRX WJPMYIIWAALWQVBHYZLBKRGZV XAZZAHTLSDNKDMFEIYNHNYPBF EUPCNMYSRBFPCMRUMDJNJORZI LFPKKZWCWBWHLAMKUPFKXPKKR TBKOVOUVZHDUWBOGXDPGLHFPE JHFERJNXRGLMRKKNAZMDFHDVW POGDIAQRJHOEIMBCGCYQHCVKA QDINAATYASNVOGJGNIHSIHPZL JXSMJHDYNGNONYRGNIKCAHFEL VFIAETRABMIUZUFMQNAUCXIDB ZFYWZOROCNJDVRVEVCFZYTSNQ SQKGJPHQRUANOMFMHSOSCBPUM ZTNKEFMEGWJAVJOBAJUEDBNUJ
1.
Virus
2.
Spyware
3.
Ransomware
4.
Phishing
5.
Pretexting
6.
Engineering
7.
Hacking
8.
Password
9.
Malware
10.
Firewall
11.
Encryption
12.
Cookies
13.
Theft
14.
Privacy