Cybersecurity Tech Terms, Part 1

Edit Answers
AWLINYDKWQLISGHXSWGIBHARUBTHQV MXAGEZLDRPWSBLWMPVMSHNLAKRKBEI SFHRDZIMOYEVPMDHSOIWORMNAHSWJK IFZGDQUUBSRILJVZWTUOIYQNGUFQZB LRORURNRDLAVAFIUNZRICOTFHGGNTZ ATABTAISMXWSGCBUGNIHSIFTACNFOU DSLNURUVVTDAIQIQTYPBMFNWKZIDBD NUPITXOTIEAIAJCMVOFAFOMNKJFAXP AIFYMIFJMNTXRYAZLLLVUOFCZAOTVG VPLAWEVIAVGGIPRAKWGOISFXXROAGN RZKRHARIJNPDSDATASKIMMINGDPBNI ESITUCRCRUHKMSZRRTIKTOORBESRIM BSILRSREEULOEBEXIUEKLDUKWRVEFR YKUEOGJIYUSDROWSSAPGNORTSAJAFA CLBRHBOTBBPFESDTNCUPXVYAQWACIH IYGNIPPORDSEVAECINORTCELELIHNP CUTINVASIONOFPRIVACYWLOBTAPPSN COPYRIGHTINFRINGEMENTNSFMMMSFJ AKROWTENETAVIRPLAUTRIVTPYKYVBZ NYGNIREENIGNELAICOSTKOXKQBWAXV
1.
Bot
2.
DDoS
3.
BulkSpam
4.
Virus
5.
Malware
6.
Worm
7.
TrojanHorse
8.
Rootkit
9.
Spyware
10.
Adware
11.
Plagiarism
12.
CopyrightInfringement
13.
InvasionOfPrivacy
14.
ElectronicEavesdropping
15.
Pharming
16.
DataSkimming
17.
WarDriving
18.
CyberCrime
19.
Antivirus
20.
Antimalware
21.
Spoofing
22.
VirtualPrivateNetwork
23.
DataBreach
24.
StrongPasswords
25.
catfishing
26.
theft
27.
sniffing
28.
cyberVandalism
29.
socialEngineering