InfoTech Ethics & Security, Part 2

Edit Answers
JPESKTDZRNWFZEVSRZLRRVDDESBEXX KNGLYCNZEJJNUMYBMRUHPBNXFUNHCJ XSNYJKVYLPUDWZNAYIFUBLARFSUATX VYIDFXCWYDIIEYXQZXYZEIABUULZVF ILMTYKLVGTERAWYPSDOTTXAGTNTLCI RQMIDEHLFTYPHTOBMRNOVTZAIQWKBA UXIKCPBURNQXLUWQLGDCXRLDNAYOCP SKKTZYQIQIRATTADWAREGIRWSLRYEZ ELSOEIWYCAVIRPFONOISAVNIWMYIRM EKAOKJSWDMOOCMKDRGLDQOXLDGCESH EXTRVUAPNRJVLXCOWZEYMPMQRWDQUM SEAPDLHKJAQGATKUPXZVJVHXRHZOYX AMDOWIKONCOPYRIGHTINFRINGEMENT TAGETDMHOWJKHTKXZTYVFJEVIKAPGZ UPGRZVOGNIPPORDSEVAECINORTCELE HSVKSRZERAWLAMKUJRNVPNBCMMILTO MKSXSWARDRIVINGWORMLJWRPYPAKIT BLOERLHRUIVUMDPUCOGJXDENCKVNEX FUDHVYYVSWCGBQXKTLULXIEYGGGLID WBDJIECOUTCYGNIMRAHPEULMDMWUZY
1.
Bot
2.
DDoS
3.
BulkSpam
4.
Virus
5.
Malware
6.
Worm
7.
TrojanHorse
8.
Rootkit
9.
Spyware
10.
Adware
11.
Plagiarism
12.
CopyrightInfringement
13.
InvasionOfPrivacy
14.
ElectronicEavesdropping
15.
Pharming
16.
DataSkimming
17.
WarDriving