Cybersecurity Tech Terms, Part 2

Edit Answers
PDJQVZGNITIEFRETNUOCLATIGIDCWN ZTHGIRYPOCSOOHACKINGEEMDWLUYKJ BULLETINBOARDPIRACYITECSCCEBUZ GLYHSDLPGNISIHPECMYLHQOVYLFELY NKTXNTFIREWALLJHJYCLIZMVBSBRTC IFTIMEBOMBDVSCANNINGCAPAESHSRK PCASBODARANSOMWAREKZSYULRDDEAA POTDLQYZUTDPHSZPJPUEIWTJSXUCPN AMZSUXCOSSIIYWJRBWQNEEESEZAUDT ZPINTELLECTUALPROPERTYRYXCRROI RUBOCVDVZIUKMRHGJKLPBICHCTFIOS ETTOSZOMBIENETWORKNDBLRQRAETRP PENSXLUVHDMUDYZHYHUAOFICIMRYGY URHARDDISKLOADINGRURKCMYMDIIIW SEHWFJGSGFREGGOLYEKKQKESESWOPA PTSETADPUERAWTFOSNTWVZIIUDCVGR GHNPUWKAPJPXBZGOXUGEHACKINGAIE EIMVDNONDPVPUFULHUIBMXGWUHQAMW WCSPOOFINGDDVHRVGNLMXSVCOROOPS ZSBVFXWEHJZEASOFTWARERENTALMLU
1.
Ransomware
2.
ZombieNetwork
3.
Hacking
4.
DarkWeb
5.
Keylogger
6.
Ethics
7.
ComputerEthics
8.
Copyright
9.
IntellectualProperty
10.
Hacking
11.
Counterfeiting
12.
Piracy
13.
HardDiskLoading
14.
BulletinBoardPiracy
15.
SoftwareRental
16.
ComputerCrime
17.
Phising
18.
WireFraud
19.
DigitalCounterfeit
20.
CyberSexCrime
21.
Firewall
22.
Antispyware
23.
Cybersecurity
24.
SoftwareUpdates
25.
scanning
26.
superZapping
27.
spoofing
28.
timeBomb
29.
trapDoor
30.
scams