Cybersecurity, Part 1

Edit Answers
ZLPQSXICXSNFNKTROJANHORSEQYTBC LYTWWSSNJUADHMTJCIMGJCGHXPDEJB SSSNGELECTRONICEAVESDROPPINGOA PQFCRCEGNSQPETLNWJEWKWCPUFPTQN JLEJPVOKJPUAKNFEGSBANTIVIRUSCS SUATHCYMLYMIQUKENFULBOWYZOGTMT ZXRLAEGSWWNJTNRXIYLTALRSQMBILR OKWERVWIZATTSAFGFJKJDMCKZROKDO PHUAMZORLRTSWXZPOPSCFWGGEDTTHN ZVWKIMRAMEILHGUPOPPNNXODVAEOCG GDQRNNMIGJAQAQVXPMAEFCMCLTMOAP AXWHGREGBMUEDAQHSZMKPAABXAIREA XNSXIMYAYCAVIRPFONOISAVNISRLRS IVIRTUALPRIVATENETWORKZUNKCTBS ZOYIFTIPWARDRIVINGWBKCGGGIREAW HWPHKMDLMXCRIVVDABYQWJVGSMERTO WSCMUEPPCMWAWSLDUTJJPEDEEMBRAR IIAEVAEDTIGVIRUSHGDDOSVIHIYODD HBLTNEMEGNIRFNITHGIRYPOCYNCUPS UACLGXANTIMALWAREDPETWCSIGDGOJ
1.
Bot
2.
DDoS
3.
BulkSpam
4.
Virus
5.
Malware
6.
Worm
7.
TrojanHorse
8.
Rootkit
9.
Spyware
10.
Adware
11.
Plagiarism
12.
CopyrightInfringement
13.
InvasionOfPrivacy
14.
ElectronicEavesdropping
15.
Pharming
16.
DataSkimming
17.
WarDriving
18.
CyberCrime
19.
Antivirus
20.
Antimalware
21.
Spoofing
22.
VirtualPrivateNetwork
23.
DataBreach
24.
StrongPasswords